Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-32399 (GCVE-0-2021-32399)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:17:29.394Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-23T01:08:11",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-32399",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210622-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-32399",
"datePublished": "2021-05-10T21:19:16",
"dateReserved": "2021-05-07T00:00:00",
"dateUpdated": "2024-08-03T23:17:29.394Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-32399\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-05-10T22:15:06.053\",\"lastModified\":\"2024-11-21T06:06:59.640\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.\"},{\"lang\":\"es\",\"value\":\"El archivo net/bluetooth/hci_request.c en el kernel de Linux versiones hasta 5.12.2, presenta una condici\u00f3n de carrera para la eliminaci\u00f3n del controlador HCI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.12.2\",\"matchCriteriaId\":\"E122193F-2C56-4FF3-BD30-DA6BC408C64B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210622-0006/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/11/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210622-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
cnvd-2021-34716
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80
| Name | Linux Linux kernel 5.12.2 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-32399"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel 5.12.2\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002Linux \u5185\u6838\u4e2dnet/bluetooth/hci_request.c\u5177\u6709\u5220\u9664HCI\u63a7\u5236\u5668\u7684\u7ade\u4e89\u6761\u4ef6\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-34716",
"openTime": "2021-05-15",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel 5.12.2\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002Linux \u5185\u6838\u4e2dnet/bluetooth/hci_request.c\u5177\u6709\u5220\u9664HCI\u63a7\u5236\u5668\u7684\u7ade\u4e89\u6761\u4ef6\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2021-34716\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel 5.12.2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"serverity": "\u4e2d",
"submitTime": "2021-05-12",
"title": "Linux kernel\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2021-34716\uff09"
}
rhsa-2021:2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:37+00:00",
"generator": {
"date": "2025-10-09T20:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:09+00:00",
"generator": {
"date": "2025-10-10T19:53:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2025-10-17T17:27:32+00:00",
"generator": {
"date": "2025-10-17T17:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-17T17:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated with an important severity as it allows an attacker to inject X11 protocol commands on X clients with the privileges of the application linked with the libX11 library, potentially having administrative privileges. However, Red Hat Enterprise Linux 8 and 9 do not run the Xorg server with root privileges, lowering the security impact of this issue. For this reason, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation -\u003e CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality and least privilege to ensure that only essential services, features, and ports are enabled, reducing the attack surface and exposure to input-driven or command injection vulnerabilities. Secure baseline configurations are established during system design, and CI/CD pipelines enforce security through SAST/DAST testing, restricted command execution, and mandatory peer reviews for manual code promotions. Input validation is consistently applied across all services within the system boundary to prevent improper handling of untrusted data. Process isolation ensures that components handling external input operate in separate execution domains, containing potential impact. Malicious code protections, including IDS and IPS, work with real-time monitoring to detect and respond to exploitation attempts. Centralized logging supports correlation, alerting, and anomaly detection, while robust error handling further reduces the risk of system instability or data exposure resulting from unvalidated input or improper command execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:52+00:00",
"generator": {
"date": "2024-11-15T11:55:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:09+00:00",
"generator": {
"date": "2025-10-10T19:53:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
RHSA-2021:3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:12+00:00",
"generator": {
"date": "2025-10-10T19:53:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:39+00:00",
"generator": {
"date": "2024-11-15T11:55:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:36+00:00",
"generator": {
"date": "2025-10-09T20:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T11:55:09+00:00",
"generator": {
"date": "2024-11-15T11:55:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:07+00:00",
"generator": {
"date": "2025-10-10T19:53:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:37+00:00",
"generator": {
"date": "2025-10-09T20:53:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2022:0157
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0157",
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0157.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:27:37+00:00",
"generator": {
"date": "2025-10-09T20:27:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0157",
"initial_release_date": "2022-01-18T08:53:13+00:00",
"revision_history": [
{
"date": "2022-01-18T08:53:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-18T08:53:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product_id": "kernel-0:2.6.32-754.43.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.43.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974319"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA. This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "RHBZ#1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
}
],
"release_date": "2021-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:32+00:00",
"generator": {
"date": "2024-11-15T11:55:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:07+00:00",
"generator": {
"date": "2025-10-10T19:53:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3363
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Regression] RHEL8.2 - ISST-LTE:pVM:diapvmlp83:sum:memory DLPAR fails to add memory on multiple trials[mm/memory_hotplug.c:1163] (mm-) (BZ#1930169)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967100)\n\n* s390/uv: Fix handling of length extensions (BZ#1975657)\n\n* RHEL 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id\u0027s over 8 (BZ#1976265)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5 (BZ#1978711)\n\n* rhel8.3: phase 2 netfilter backports from upstream (BZ#1980323)\n\n* xfrm: backports from upstream (BZ#1981841)\n\nEnhancement(s):\n\n* [8.2.z] Incorrect parsing of ACPI HMAT table reports incorrect kernel WARNING taint (BZ#1943702)\n\n* Only selected patches from [IBM 8.4 FEAT] ibmvnic: Backport FW950 and assorted bug fixes (BZ#1980795)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3363",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3363.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3363",
"initial_release_date": "2021-08-31T09:30:45+00:00",
"revision_history": [
{
"date": "2021-08-31T09:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.64.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.64.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.64.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.64.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.64.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"known_not_affected": [
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:30:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.64.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.64.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.64.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:56:11+00:00",
"generator": {
"date": "2024-11-15T11:56:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3375
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z11 Batch source tree (BZ#1984586)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3375",
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3375.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:17+00:00",
"generator": {
"date": "2024-11-15T11:55:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3375",
"initial_release_date": "2021-08-31T08:56:13+00:00",
"revision_history": [
{
"date": "2021-08-31T08:56:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:56:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.64.1.rt13.115.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:56:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3375"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.64.1.rt13.115.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:33+00:00",
"generator": {
"date": "2025-10-09T20:53:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:05+00:00",
"generator": {
"date": "2024-11-15T11:55:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2024-11-15T11:55:51+00:00",
"generator": {
"date": "2024-11-15T11:55:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 therefore this flaw has been rated as having moderate impact for Red Hat Enterprise linux 8. RHEL 9 is not vulnerable but is affected, because it is not default configured to run as root.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:30+00:00",
"generator": {
"date": "2024-11-15T11:55:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2024-11-22T16:59:58+00:00",
"generator": {
"date": "2024-11-22T16:59:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:59:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
rhsa-2021:3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:08+00:00",
"generator": {
"date": "2025-10-10T19:53:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3392
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3392",
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3392.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:42+00:00",
"generator": {
"date": "2025-10-09T20:53:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3392",
"initial_release_date": "2021-08-31T13:41:53+00:00",
"revision_history": [
{
"date": "2021-08-31T13:41:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T13:41:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T13:41:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3392
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3392",
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3392.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:42+00:00",
"generator": {
"date": "2025-10-09T20:53:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3392",
"initial_release_date": "2021-08-31T13:41:53+00:00",
"revision_history": [
{
"date": "2021-08-31T13:41:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T13:41:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T13:41:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3327
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1897576)\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1915449)\n\n* XFS: read-only recovery does not update free space accounting in superblock (BZ#1921551)\n\n* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. (BZ#1951810)\n\n* Backport of upstream patch \"net: Update window_clamp if SOCK_RCVBUF is set \" into rhel-7 (BZ#1962196)\n\n* Kernel panic in init_cq_frag_buf (BZ#1962499)\n\n* futex: futex_requeue can potentially free the pi_state structure twice (BZ#1966856)\n\n* be_poll lockup doing ifenslave when netconsole using bond (BZ#1971744)\n\n* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() (BZ#1972970)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3327",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1897576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897576"
},
{
"category": "external",
"summary": "1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3327.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T16:35:11+00:00",
"generator": {
"date": "2024-11-22T16:35:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3327",
"initial_release_date": "2021-08-31T09:22:59+00:00",
"revision_history": [
{
"date": "2021-08-31T09:22:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:22:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T16:35:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1160.41.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1160.41.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1160.41.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1160.41.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Daniel Axtens"
],
"organization": "IBM"
}
],
"cve": "CVE-2020-27777",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2020-10-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27777"
},
{
"category": "external",
"summary": "RHBZ#1900844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1",
"url": "https://www.openwall.com/lists/oss-security/2020/10/09/1"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2",
"url": "https://www.openwall.com/lists/oss-security/2020/11/23/2"
}
],
"release_date": "2020-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"known_not_affected": [
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:22:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-headers-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Client-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Client-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Client-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7ComputeNode-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7ComputeNode-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7ComputeNode-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Server-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Server-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Server-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:bpftool-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.src",
"7Workstation-optional-7.9.Z:kernel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-abi-whitelists-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-bootwrapper-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debug-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-s390x-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-doc-0:3.10.0-1160.41.1.el7.noarch",
"7Workstation-optional-7.9.Z:kernel-kdump-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-kdump-devel-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:kernel-tools-libs-devel-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-0:3.10.0-1160.41.1.el7.x86_64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.ppc64le",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.s390x",
"7Workstation-optional-7.9.Z:python-perf-debuginfo-0:3.10.0-1160.41.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3392
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3392",
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3392.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:46+00:00",
"generator": {
"date": "2024-11-15T11:55:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3392",
"initial_release_date": "2021-08-31T13:41:53+00:00",
"revision_history": [
{
"date": "2021-08-31T13:41:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T13:41:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_70_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_72_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_76_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_78_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T13:41:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3392"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_70_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_72_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_76_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.src",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-0:1-1.el7.x86_64",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.6.E4S:kpatch-patch-3_10_0-957_78_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:53:36+00:00",
"generator": {
"date": "2025-10-09T20:53:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:33+00:00",
"generator": {
"date": "2025-10-09T20:53:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_3320
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3320",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:37+00:00",
"generator": {
"date": "2024-11-15T11:55:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3320",
"initial_release_date": "2021-08-31T08:31:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:31:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:31:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product_id": "kernel-0:3.10.0-957.80.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3173
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3173",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3173.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:03+00:00",
"generator": {
"date": "2025-10-10T19:53:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3173",
"initial_release_date": "2021-08-17T08:35:56+00:00",
"revision_history": [
{
"date": "2021-08-17T08:35:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:35:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.1::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.52.1.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.52.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.52.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.52.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)",
"product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:35:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.src",
"CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.52.1.el8_1.noarch",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.52.1.el8_1.x86_64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.aarch64",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.ppc64le",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.s390x",
"CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.52.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3523
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3523",
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3523.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3523",
"initial_release_date": "2021-09-14T08:54:45+00:00",
"revision_history": [
{
"date": "2021-09-14T08:54:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:54:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_36_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_37_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_40_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_43_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_45_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_46_1-debuginfo@1-4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_49_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_51_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_52_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:54:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3523"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_36_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_37_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_40_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_43_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_45_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_46_1-debuginfo-0:1-4.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_49_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_51_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.src",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-0:1-1.el7.x86_64",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.7.E4S:kpatch-patch-3_10_0-1062_52_2-debuginfo-0:1-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_2714
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* pinctrl_emmitsburg: improper configuration (BZ#1963984)\n\n* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)\n\n* RHEL8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/RHEL8.4) (BZ#1964697)\n\n* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)\n\n* backport fixes for Connection Tracking offload (BZ#1968679)\n\n* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)\n\n* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)\n\n* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)\n\n* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)\n\n* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)\n\n* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)\n\n* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)\n\n* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)\n\n* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)\n\n* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)\n\n* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)\n\n* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)\n\n* Backport netlink extack tracepoint (BZ#1972938)\n\n* [RHEL8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2714",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2714.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:31+00:00",
"generator": {
"date": "2024-11-15T11:52:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2714",
"initial_release_date": "2021-07-20T22:47:03+00:00",
"revision_history": [
{
"date": "2021-07-20T22:47:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:47:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.10.2.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.10.2.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_id": "kernel-0:4.18.0-305.10.2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.10.2.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.10.2.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:47:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.src",
"CRB-8.4.0.Z.MAIN.EUS:kernel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-305.10.2.el8_4.noarch",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-0:4.18.0-305.10.2.el8_4.x86_64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.aarch64",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.ppc64le",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.s390x",
"CRB-8.4.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-305.10.2.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021_2715
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z2 source tree (BZ#1975405)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2715",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2715.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:52:37+00:00",
"generator": {
"date": "2024-11-15T11:52:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2715",
"initial_release_date": "2021-07-20T20:59:11+00:00",
"revision_history": [
{
"date": "2021-07-20T20:59:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T20:59:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.10.2.rt7.83.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T20:59:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"NFV-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.src",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64",
"RT-8.4.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-305.10.2.rt7.83.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
rhsa-2021:3380
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3380",
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3380.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3380",
"initial_release_date": "2021-08-31T09:18:03+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-11.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-9.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_46_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debugsource@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_47_1-debuginfo@1-6.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debugsource@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_51_1-debuginfo@1-3.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debugsource@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_56_1-debuginfo@1-2.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debugsource@1-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_id": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_60_2-debuginfo@1-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2021-3609",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1971651"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in net/can/bcm.c leads to local privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.\n\nFor Red Hat Virtualization, this flaw is rated Moderate as CAN is not used on host nodes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "RHBZ#1971651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3609"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
"url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
}
],
"release_date": "2021-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "As the CAN module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install can-bcm /bin/true\" \u003e\u003e /etc/modprobe.d/disable-can-bcm.conf\n\nThe system will need to be restarted if the CAN modules are loaded. In most circumstances, the CAN kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in net/can/bcm.c leads to local privilege escalation"
},
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3380"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-11.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-9.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_46_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debuginfo-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_47_1-debugsource-0:1-6.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debuginfo-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_51_1-debugsource-0:1-3.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debuginfo-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_56_1-debugsource-0:1-2.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debuginfo-0:1-1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_60_2-debugsource-0:1-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3321
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975162)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3321",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3321.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3321",
"initial_release_date": "2021-08-31T08:15:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:15:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:15:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.src",
"product_id": "kernel-0:3.10.0-514.92.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.92.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.92.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.92.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.92.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.92.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:15:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.92.1.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.92.1.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.92.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T17:16:18+00:00",
"generator": {
"date": "2024-11-22T17:16:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:16:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2022:0157
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0157",
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0157.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:27:37+00:00",
"generator": {
"date": "2025-10-09T20:27:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:0157",
"initial_release_date": "2022-01-18T08:53:13+00:00",
"revision_history": [
{
"date": "2022-01-18T08:53:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-18T08:53:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product_id": "kernel-0:2.6.32-754.43.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.43.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974319"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA. This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "RHBZ#1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
}
],
"release_date": "2021-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:56:04+00:00",
"generator": {
"date": "2024-11-15T11:56:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:56:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3522
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* sysfs: cannot create duplicate filename \u0027/class/mdio_bus/ixgbe-8100 (BZ#1972707)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975158)\n\n* SAN Switch rebooted and caused (?) OpenStack compute node to reboot (BZ#1984118)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3522",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3522.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:12+00:00",
"generator": {
"date": "2025-10-10T19:53:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3522",
"initial_release_date": "2021-09-14T08:53:04+00:00",
"revision_history": [
{
"date": "2021-09-14T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-14T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.56.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.56.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.56.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.7)",
"product_id": "7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.7)",
"product_id": "7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.7)",
"product_id": "7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.7)",
"product_id": "7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.7)",
"product_id": "7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.7)",
"product_id": "7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-14T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.AUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.AUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.AUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.E4S:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-bootwrapper-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.ppc64le",
"7Server-optional-7.7.E4S:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:bpftool-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.src",
"7Server-optional-7.7.TUS:kernel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-abi-whitelists-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-debug-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debug-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-doc-0:3.10.0-1062.56.1.el7.noarch",
"7Server-optional-7.7.TUS:kernel-headers-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:kernel-tools-libs-devel-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-0:3.10.0-1062.56.1.el7.x86_64",
"7Server-optional-7.7.TUS:python-perf-debuginfo-0:3.10.0-1062.56.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3320
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3320",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:40+00:00",
"generator": {
"date": "2025-10-09T20:53:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3320",
"initial_release_date": "2021-08-31T08:31:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:31:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:31:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product_id": "kernel-0:3.10.0-957.80.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3381
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3381",
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3381.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3381",
"initial_release_date": "2021-08-31T09:36:58+00:00",
"revision_history": [
{
"date": "2021-08-31T09:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_2_2-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_6_1-debuginfo@1-8.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_11_1-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_15_2-debuginfo@1-7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_21_1-debuginfo@1-5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_24_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_25_1-debuginfo@1-3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_31_1-debuginfo@1-2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2@1-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_id": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1160_36_2-debuginfo@1-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3381"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_11_1-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_15_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_21_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_24_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_25_1-debuginfo-0:1-3.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_2_2-debuginfo-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_31_1-debuginfo-0:1-2.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_36_2-debuginfo-0:1-1.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.src",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-0:1-8.el7.x86_64",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.ppc64le",
"7Server-7.9.Z:kpatch-patch-3_10_0-1160_6_1-debuginfo-0:1-8.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3320
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3320",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3320.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T20:53:40+00:00",
"generator": {
"date": "2025-10-09T20:53:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3320",
"initial_release_date": "2021-08-31T08:31:38+00:00",
"revision_history": [
{
"date": "2021-08-31T08:31:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T08:31:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.src",
"product_id": "kernel-0:3.10.0-957.80.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.80.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.80.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.80.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.6)",
"product_id": "7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.6)",
"product_id": "7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.6)",
"product_id": "7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.6)",
"product_id": "7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.6)",
"product_id": "7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.80.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.6)",
"product_id": "7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-8648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-02-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1802559"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel console driver when using the copy-paste buffer. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The impact is moderate, because of the need of additional privileges (usually local console user).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "RHBZ#1802559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8648"
}
],
"release_date": "2020-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T08:31:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.AUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.AUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.AUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.E4S:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-bootwrapper-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.ppc64le",
"7Server-optional-7.6.E4S:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:bpftool-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.src",
"7Server-optional-7.6.TUS:kernel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-abi-whitelists-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-debug-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debug-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-doc-0:3.10.0-957.80.1.el7.noarch",
"7Server-optional-7.6.TUS:kernel-headers-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:kernel-tools-libs-devel-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-0:3.10.0-957.80.1.el7.x86_64",
"7Server-optional-7.6.TUS:python-perf-debuginfo-0:3.10.0-957.80.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:3399
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Use after free via PI futex state (CVE-2021-3347)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975163)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3399",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3399.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:11+00:00",
"generator": {
"date": "2025-10-10T19:53:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3399",
"initial_release_date": "2021-08-31T19:48:07+00:00",
"revision_history": [
{
"date": "2021-08-31T19:48:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T19:48:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.src",
"product_id": "kernel-0:3.10.0-327.100.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.100.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.100.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.100.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.100.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.100.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3347",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-01-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1922249"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use after free via PI futex state",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3347"
},
{
"category": "external",
"summary": "RHBZ#1922249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922249"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3347"
}
],
"release_date": "2021-01-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Use after free via PI futex state"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T19:48:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.100.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.100.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.100.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-09T20:53:34+00:00",
"generator": {
"date": "2025-10-09T20:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
rhsa-2021_3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:55:14+00:00",
"generator": {
"date": "2024-11-15T11:55:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_3328
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the latest RHEL7.9.z8 source tree (BZ#1982927)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3328",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3328.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T11:55:00+00:00",
"generator": {
"date": "2024-11-15T11:55:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:3328",
"initial_release_date": "2021-08-31T09:18:32+00:00",
"revision_history": [
{
"date": "2021-08-31T09:18:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-31T09:18:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:55:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1160.41.1.rt56.1181.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1160.41.1.rt56.1181.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time (v. 7)",
"product_id": "7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-29650",
"cwe": {
"id": "CWE-662",
"name": "Improper Synchronization"
},
"discovery_date": "2021-03-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1945388"
}
],
"notes": [
{
"category": "description",
"text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "RHBZ#1945388",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1"
}
],
"release_date": "2021-03-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-31T09:18:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-NFV-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-NFV-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-NFV-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.src",
"7Server-RT-7.9.Z:kernel-rt-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-doc-0:3.10.0-1160.41.1.rt56.1181.el7.noarch",
"7Server-RT-7.9.Z:kernel-rt-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-devel-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64",
"7Server-RT-7.9.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1160.41.1.rt56.1181.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2022_0157
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:0157",
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0157.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T11:59:55+00:00",
"generator": {
"date": "2024-11-15T11:59:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:0157",
"initial_release_date": "2022-01-18T08:53:13+00:00",
"revision_history": [
{
"date": "2022-01-18T08:53:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-01-18T08:53:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:59:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.src",
"product_id": "kernel-0:2.6.32-754.43.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.43.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.43.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.43.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.43.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)",
"product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.src",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)",
"product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36385",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-06-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974319"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernels Userspace Connection Manager Access for RDMA. This could allow a local attacker to crash the system, corrupt memory or escalate privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "RHBZ#1974319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974319"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36385"
}
],
"release_date": "2021-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"known_not_affected": [
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-01-18T08:53:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-headers-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.src",
"6Server-optional-ELS:kernel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-devel-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:kernel-doc-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-firmware-0:2.6.32-754.43.1.el6.noarch",
"6Server-optional-ELS:kernel-kdump-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-0:2.6.32-754.43.1.el6.x86_64",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.i686",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.s390x",
"6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.43.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021:3477
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks.\n\nSecurity Fix(es):\n\n* sssd: shell command injection in sssctl (CVE-2021-3621)\n\n* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* libX11: missing request length checks (CVE-2021-31535)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3477",
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3477.json"
}
],
"title": "Red Hat Security Advisory: RHV-H security update (redhat-virtualization-host) 4.3.18",
"tracking": {
"current_release_date": "2025-10-17T17:27:32+00:00",
"generator": {
"date": "2025-10-17T17:27:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3477",
"initial_release_date": "2021-09-09T09:25:32+00:00",
"revision_history": [
{
"date": "2021-09-09T09:25:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-09-09T09:25:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-17T17:27:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_id": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.18-20210903.0.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.18-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.18-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.18-20210903.0.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Cedric Buissart"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2021-3621",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2021-06-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1975142"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sssd: shell command injection in sssctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is exploitable only when root is tricked into running a specially crafted command. The most likely scenario is when users are allowed to run a sssctl command via a dedicated `sudo` rule.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3621"
},
{
"category": "external",
"summary": "RHBZ#1975142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3621"
}
],
"release_date": "2021-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sssd: shell command injection in sssctl"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2021-3715",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-08-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1993988"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in route4_change() in net/sched/cls_route.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges and that Red Hat Enterprise Linux 7 disabled unprivileged user/network namespaces by default.\n\nThis flaw is rated as having Important impact (Red Hat Enterprise Linux 8) because Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to gain CAP_NET_ADMIN privileges in corresponding user namespace even for otherwise unprivileged local user and thus exercise this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "RHBZ#1993988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3715"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359"
}
],
"release_date": "2021-09-07T08:25:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module cls_route.ko. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278.\n\nAlternatively, if cls_route is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: use-after-free in route4_change() in net/sched/cls_route.c"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-31535",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2021-05-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961822"
}
],
"notes": [
{
"category": "description",
"text": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libX11: missing request length checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was rated with an important severity as it allows an attacker to inject X11 protocol commands on X clients with the privileges of the application linked with the libX11 library, potentially having administrative privileges. However, Red Hat Enterprise Linux 8 and 9 do not run the Xorg server with root privileges, lowering the security impact of this issue. For this reason, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation -\u003e CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality and least privilege to ensure that only essential services, features, and ports are enabled, reducing the attack surface and exposure to input-driven or command injection vulnerabilities. Secure baseline configurations are established during system design, and CI/CD pipelines enforce security through SAST/DAST testing, restricted command execution, and mandatory peer reviews for manual code promotions. Input validation is consistently applied across all services within the system boundary to prevent improper handling of untrusted data. Process isolation ensures that components handling external input operate in separate execution domains, containing potential impact. Malicious code protections, including IDS and IPS, work with real-time monitoring to detect and respond to exploitation attempts. Centralized logging supports correlation, alerting, and anomaly detection, while robust error handling further reduces the risk of system instability or data exposure resulting from unvalidated input or improper command execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31535"
},
{
"category": "external",
"summary": "RHBZ#1961822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31535"
},
{
"category": "external",
"summary": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/",
"url": "https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/"
},
{
"category": "external",
"summary": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt",
"url": "https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "xterm should not be used to display less trusted data, e.g. from SSH connections to less trusted remote machines.\nTo avoid attacks via .Xdefaults on kiosk type machines, where graphical user has no permission to execute arbitrary operating system commands or sometimes not even to send hardware keyboard keystrokes, the .Xdefaults must not be modifiable by the user.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libX11: missing request length checks"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"known_not_affected": [
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-09-09T09:25:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3477"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.18-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.18-20210903.0.el7_9.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.18-20210903.0.el7_9.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.18-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
rhsa-2021_2716
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2716",
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2716.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T11:52:59+00:00",
"generator": {
"date": "2024-11-15T11:52:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2716",
"initial_release_date": "2021-07-21T00:24:39+00:00",
"revision_history": [
{
"date": "2021-07-21T00:24:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-21T00:24:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T11:52:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debugsource@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_id": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305-debuginfo@1-3.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debugsource@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_3_1-debuginfo@1-2.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debugsource@1-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_id": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-305_7_1-debuginfo@1-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-21T00:24:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2716"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debuginfo-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305-debugsource-0:1-3.el8.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debuginfo-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_3_1-debugsource-0:1-2.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debuginfo-0:1-1.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:kpatch-patch-4_18_0-305_7_1-debugsource-0:1-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
}
]
}
RHSA-2021:3725
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\n* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3725",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3725.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T19:53:13+00:00",
"generator": {
"date": "2025-10-10T19:53:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3725",
"initial_release_date": "2021-10-05T07:56:00+00:00",
"revision_history": [
{
"date": "2021-10-05T07:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-05T07:56:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.src",
"product_id": "kernel-0:3.10.0-693.94.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.94.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.94.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.94.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.94.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.94.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-37576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986506"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"known_not_affected": [
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "RHBZ#1986506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986506"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37576"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/26/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/26/1"
}
],
"release_date": "2021-07-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-05T07:56:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.94.1.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.94.1.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.94.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: powerpc: KVM guest OS users can cause host OS memory corruption"
}
]
}
rhsa-2021:3181
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)\n\n* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)\n\n* kernel: race condition for removal of the HCI controller (CVE-2021-32399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3181",
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3181.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-10T19:53:06+00:00",
"generator": {
"date": "2025-10-10T19:53:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:3181",
"initial_release_date": "2021-08-17T08:33:52+00:00",
"revision_history": [
{
"date": "2021-08-17T08:33:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-08-17T08:33:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T19:53:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-10.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-9.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debugsource@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_43_1-debuginfo@1-7.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debugsource@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_44_1-debuginfo@1-6.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_48_1-debuginfo@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debugsource@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_1-debuginfo@1-2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-12.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debugsource@1-1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_51_2-debuginfo@1-1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22543",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1965461"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 leverage udev to set the proper permissions (ugo=rw) of the `/dev/kvm` device, making it accessible to all users. It is worth noting that while the KVM rule is part of the main udev package in Red Hat Enterprise Linux 8, the same rule is shipped with the `qemu-kvm` package in Red Hat Enterprise Linux 7. In other words, Red Hat Enterprise Linux 7 does not expose `/dev/kvm` to unprivileged users by default, as long as the `qemu-kvm` package is not installed.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "RHBZ#1965461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22543"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584",
"url": "https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584"
}
],
"release_date": "2021-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks"
},
{
"cve": "CVE-2021-22555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980101"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux 7 only privileged user can trigger this bug.\nFor the Red Hat Enterprise Linux 8 regular user can trigger it, and the result is corruption of 4 bytes of memory.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "RHBZ#1980101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22555"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528",
"url": "https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "The mitigation for the Red Hat Enterprise Linux 8 is to disable for unprivileged user possibilities of running unshare(CLONE_NEWUSER) or unshare(CLONE_NEWNET) that could be done with the next command:\necho 0 \u003e /proc/sys/user/max_user_namespaces\n\nFor making this change in configuration permanent.\nNote: User namespaces are used primarily for Linux containers. If containers are in use, this requirement is not applicable.\nConfigure RHEL 8 to disable the use of user namespaces by adding the following line to a file in the \"/etc/sysctl.d/\" directory:\n\nuser.max_user_namespaces = 0\n\nThe system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:\n\n$ sudo sysctl --system\n\n\nThe other mitigation for containers, if without disabling user namespaces, is blocking the pertinent syscalls in a seccomp policy file. For more information about seccomp, please read: https://www.openshift.com/blog/seccomp-for-fun-and-profit",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-06T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-08-17T08:33:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3181"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-12.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-10.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-9.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debuginfo-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_43_1-debugsource-0:1-7.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debuginfo-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_44_1-debugsource-0:1-6.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_48_1-debugsource-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debuginfo-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_1-debugsource-0:1-2.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.src",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debuginfo-0:1-1.el8_1.x86_64",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_51_2-debugsource-0:1-1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition for removal of the HCI controller"
}
]
}
RHSA-2021:2736
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)\n\n* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)\n\n* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)\n\n* ansible: multiple modules expose secured values (CVE-2021-3447)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The redhat-release-virtualization-host package no longer requires vdsm-hooks. In this release, the installation of vdsm-hooks is not mandatory for the Red Hat Virtualization Host. (BZ#1976095)\n\n* Previously, rhsmcertd was not enabled by default on the Red Hat Virtualization Host. As a result, the systems did not regularly report to RHSM while the subscription-manager reported no obvious issues and repositories were properly enabled.\nIn this release, rhsmcertd is enabled by default in RHVH, and as a result, RHSM now receives reports regularly. (BZ#1958145)\n\n* In this release, the Red Hat Virtualization Host has been rebased on top of the RHEL 8.4.0 Batch #1 update. For more information, see the RHEL release notes. (BZ#1957242)\n\n* Red Hat Virtualization Host now includes an updated scap-security-guide-rhv which allows you to apply a PCI DSS security profile to the system during installation, (BZ#1883793)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2736",
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "1883793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883793"
},
{
"category": "external",
"summary": "1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "1955415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955415"
},
{
"category": "external",
"summary": "1957242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957242"
},
{
"category": "external",
"summary": "1958145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958145"
},
{
"category": "external",
"summary": "1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "1970970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970970"
},
{
"category": "external",
"summary": "1976005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976005"
},
{
"category": "external",
"summary": "1976095",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976095"
},
{
"category": "external",
"summary": "1976118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976118"
},
{
"category": "external",
"summary": "1976146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976146"
},
{
"category": "external",
"summary": "1976148",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976148"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2736.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization Host security and bug fix update [ovirt-4.4.7]",
"tracking": {
"current_release_date": "2025-10-09T20:53:34+00:00",
"generator": {
"date": "2025-10-09T20:53:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2021:2736",
"initial_release_date": "2021-07-22T15:09:21+00:00",
"revision_history": [
{
"date": "2021-07-22T15:09:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-22T15:09:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:53:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_id": "scap-security-guide-0:0.1.54-2.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide@0.1.54-2.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.src",
"product_id": "imgbased-0:1.2.21-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_id": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1.el8_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.src",
"product": {
"name": "vhostmd-0:1.1-5.el8.src",
"product_id": "vhostmd-0:1.1-5.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_id": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/scap-security-guide-rhv@0.1.54-2.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_id": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-imgbased@1.2.21-1.el8ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.4.7-3.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.4.7-3.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.4.7-20210715.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debugsource@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_id": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fcoe-utils-debuginfo@1.0.33-3.git848bcc6.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-devel@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debugsource@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vhostmd-debuginfo@1.1-5.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_id": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vm-dump-metrics-debuginfo@1.1-5.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64"
},
"product_reference": "fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src"
},
"product_reference": "redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src"
},
"product_reference": "vhostmd-0:1.1-5.el8.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vhostmd-debugsource-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64"
},
"product_reference": "vhostmd-debugsource-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64"
},
"product_reference": "vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "imgbased-0:1.2.21-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src"
},
"product_reference": "imgbased-0:1.2.21-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-imgbased-0:1.2.21-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch"
},
"product_reference": "python3-imgbased-0:1.2.21-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-0:0.1.54-2.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src"
},
"product_reference": "scap-security-guide-0:0.1.54-2.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
},
"product_reference": "scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"John Barker"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Felix Fontein"
]
},
{
"names": [
"Chen Zhi"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3447",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2021-03-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1939349"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ansible: multiple modules expose secured values",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Gluster Storage 3 no longer maintains its own version of ansible, prerequisite is to enable ansible repository in order to consume the latest version of ansible which has many bug and security fixes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3447"
},
{
"category": "external",
"summary": "RHBZ#1939349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3447",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3447"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447"
}
],
"release_date": "2021-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ansible: multiple modules expose secured values"
},
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-05-11T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970807"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u2019s handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition for removal of the HCI controller",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "RHBZ#1970807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
}
],
"release_date": "2021-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "To mitigate these vulnerabilities on the operating system level, disable the Bluetooth functionality via blocklisting kernel modules in the Linux kernel. The kernel modules can be prevented from being loaded by using system-wide modprobe rules. Instructions on how to disable Bluetooth modules are available on the Customer Portal at https://access.redhat.com/solutions/2682931.\n\nAlternatively, Bluetooth can be disabled within the hardware or at the BIOS level which will also provide effective mitigation as the kernel will not be able to detect that Bluetooth hardware is present on the system.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition for removal of the HCI controller"
},
{
"cve": "CVE-2021-33034",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-05-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1961305"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "RHBZ#1961305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33034"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c4c8c9544099bb9043a10a5318130a943e32fc3"
},
{
"category": "external",
"summary": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl",
"url": "https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-hci_send_acl"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1",
"url": "https://syzkaller.appspot.com/bug?id=2e1943a94647f7732dd6fc60368642d6e8dc91b1"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33909",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970273"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the Linux kernel\u0027s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: size_t-to-int conversion vulnerability in the filesystem layer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Any Red Hat product which relies on the Red Hat Enterprise Linux kernel is also potentially impacted. \nThis includes layered products such as OpenShift Container Platform, OpenStack, Red Hat Virtualization, and others.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "RHBZ#1970273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33909"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/07/20/1",
"url": "https://www.openwall.com/lists/oss-security/2021/07/20/1"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: size_t-to-int conversion vulnerability in the filesystem layer"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Team"
]
}
],
"cve": "CVE-2021-33910",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-06-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1970887"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd. The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack. The highest threat from this vulnerability is to the system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as they did not use strdupa to duplicate strings in unit_name_path_escape function, but strdup, which allocates space on the heap.\n\nFurther, any Red Hat product which is supported on the Red Hat Enterprise Linux platform is also potentially impacted. This includes:\n* Product containers which are based on the RHEL or UBI container images. These images are updated regularly, and container health indicating whether a fix to this flaw is available can be seen in the Container Health Index, part of the Red Hat Container Catalog (https://access.redhat.com/containers). In addition, any customer containers should be manually rebuilt when the base images are updated.\n* Products which pull packages from the RHEL channel. Please ensure that the underlying Red Hat Enterprise Linux systemd package is current in these product environments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"known_not_affected": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "RHBZ#1970887",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887"
},
{
"category": "external",
"summary": "RHSB-2021-006",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-006"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33910"
},
{
"category": "external",
"summary": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt",
"url": "https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt"
}
],
"release_date": "2021-07-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-22T15:09:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2736"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.src",
"8Base-RHV-Hypervisor-4:fcoe-utils-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debuginfo-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:fcoe-utils-debugsource-0:1.0.33-3.git848bcc6.el8.x86_64",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.4.7-20210715.1.el8_4.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.4.7-20210715.1.el8_4.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.src",
"8Base-RHV-Hypervisor-4:vhostmd-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vhostmd-debugsource-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-debuginfo-0:1.1-5.el8.x86_64",
"8Base-RHV-Hypervisor-4:vm-dump-metrics-devel-0:1.1-5.el8.x86_64",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:imgbased-0:1.2.21-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:python3-imgbased-0:1.2.21-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.4.7-3.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.4.7-3.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-0:0.1.54-2.el8ev.src",
"8Base-RHV-HypervisorBuild-4:scap-security-guide-rhv-0:0.1.54-2.el8ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash"
}
]
}
CERTFR-2022-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Contrail Networking versions antérieures à R22.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions antérieures à 3.1.1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.2R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO | ||
| Juniper Networks | N/A | Contrail Networking versions antérieures à 2011.L5 | ||
| Juniper Networks | N/A | Steel Belted Radius Carrier Edition versions antérieures à 8.6.0R16 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à 5.4.7 | ||
| Juniper Networks | Session Smart Router | Session Smart Router versions 5.5.x antérieures à 5.5.3 | ||
| Juniper Networks | N/A | Paragon Active Assurance (anciennement Netrounds) versions 3.2.x antérieures à 3.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.2R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S4-EVO, 21.2R2-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S3-EVO, 21.1R2-EVO, 21.2R1-EVO, 20.4R3-S4-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S4-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 21.4R3-EVO, 22.1R1-S2-EVO, 22.1R3-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.4R1-S2-EVO, 21.4R2-S1-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, 20.4R3-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S3-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S1-EVO, 21.4R2-EVO, 22.1R1-EVO, 20.4R3-S1-EVO, 21.2R1-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.4R3-S5-EVO, 21.1R3-S2-EVO, 21.2R3-S1-EVO, 21.3R3-S2-EVO, 21.4R2-EVO, 22.1R2-EVO, 22.2R2-EVO, 22.3R1-EVO, 20.4R3-S4-EVO, 21.1R3-S2-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, 20.2R3-S3-EVO, 20.4R3-S1-EVO, 21.3R2-EVO, 21.4R1-EVO, 21.1R3-S2-EVO, 21.2R3-S2-EVO, 21.3R3-EVO, 21.4R1-S1-EVO, 21.4R2-EVO et 22.1R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Contrail Networking versions ant\u00e9rieures \u00e0 2011.L5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Steel Belted Radius Carrier Edition versions ant\u00e9rieures \u00e0 8.6.0R16",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 19.2R3-S6, 20.2R3-S4, 20.3R3-S3, 20.4R3-S4, 21.1R2, 21.2R2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R3-S9, 20.2R3-S5, 20.3R3-S4, 20.4R3-S4, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S2, 21.4R2, 22.1R1, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R1-S2, 21.3R2, 21.4R1, 19.1R3-S9, 19.2R3-S5, 19.3R3-S3, 19.4R3-S9, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, 15.1R7-S11, 18.4R2-S10, 18.4R3-S10, 19.1R3-S8, 19.2R3-S4, 19.3R3-S5, 19.4R2-S6, 19.4R3-S7, 20.1R3-S3, 20.2R3-S3, 20.3R3-S2, 20.4R3-S4, 21.1R3, 21.2R3-S3, 21.3R3-S1, 21.4R1, 15.1R7-S13, 19.1R3-S9, 19.2R3-S6, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.2R3-S5, 20.3R3-S5, 20.4R3-S2, 21.1R3, 21.2R3, 21.3R2, 21.4R1, 18.4R2-S10, 18.4R3-S10, 19.1R3-S7, 19.2R1-S8, 19.2R3-S4, 19.4R3-S8, 20.2R3-S3, 20.3R3-S2, 20.4R3, 21.1R2, 21.2R1, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S3, 21.2R3-S2, 21.3R3-S1, 21.4R2-S1, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R1-S1, 22.2R2, 22.3R1, 21.3R3-S2, 21.4R2-S2, 21.4R3, 22.1R1-S2, 22.1R3, 22.2R2, 22.3R1, 21.2R3-S1, 21.3R2-S2, 21.3R3, 21.4R2-S1, 21.4R3, 22.1R1-S1, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2-S1, 21.4R3, 22.1R2, 22.2R1, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 17.3R3-S12, 17.4R2-S13, 17.4R3-S5, 18.1R3-S13, 18.2R3-S8, 18.3R3-S5, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R3-S4, 19.2R1-S7, 19.2R3-S1, 19.3R2-S6, 19.3R3-S1, 19.4R1-S4, 19.4R2-S4, 19.4R3-S1, 20.1R2, 20.2R2-S3, 20.2R3, 20.3R2, 20.4R1, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R2, 22.1R2, 22.2R1, 20.2R3-S5, 20.3R3-S4, 20.4R3-S3, 21.1R3-S2, 21.2R3-S1, 21.3R3, 21.4R1-S2, 21.4R2, 22.1R1-S1, 22.1R2, 22.2R1, 18.4R3-S11, 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.3R3-S6, 19.4R2-S7, 19.4R3-S8, 20.1R3-S4, 20.2R3-S4, 20.3R3-S4, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R2, 22.1R1, 19.2R3-S5, 19.3R3-S5, 19.4R2-S6, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S3, 21.1R3-S1, 21.2R3, 21.3R2, 21.4R1-S1, 21.4R2, 22.1R1, 19.4R3-S9, 20.2R3-S5, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R2-S1, 21.2R3, 21.3R2, 21.4R1, 21.4R1-S2, 21.4R2, 22.1R1, 19.2R3-S6, 19.4R2-S8, 19.4R3-S9, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.2R3-S1, 21.3R3-S2, 21.4R2, 22.1R2, 22.3R1, 18.4R2-S9, 18.4R3-S11, 19.1R3-S8, 19.3R3-S5, 19.4R2-S6, 19.4R3-S6, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3-S3, 21.2R2-S1, 21.2R3, 21.3R1, 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, 19.4R3-S8, 20.1R3-S2, 20.2R3-S3, 20.3R3-S2, 20.4R3-S1, 21.1R3, 21.2R1-S2, 21.2R3, 21.3R2, 21.4R1, 20.4R3-S4, 21.1R3-S2, 21.2R3-S2, 21.3R2-S2, 21.3R3, 21.4R1-S2, 21.4R2, 21.4R3, 22.1R1-S1, 22.1R2 et 22.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions ant\u00e9rieures \u00e0 5.4.7",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Session Smart Router versions 5.5.x ant\u00e9rieures \u00e0 5.5.3",
"product": {
"name": "Session Smart Router",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Paragon Active Assurance (anciennement Netrounds) versions 3.2.x ant\u00e9rieures \u00e0 3.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22243"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2020-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2022-22238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22238"
},
{
"name": "CVE-2022-22249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22249"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22227"
},
{
"name": "CVE-2016-0701",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0701"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2022-22208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22208"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2017-5929",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5929"
},
{
"name": "CVE-2022-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22218"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22201"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2018-20532",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20532"
},
{
"name": "CVE-2022-22246",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22246"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2022-22250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22250"
},
{
"name": "CVE-2022-22192",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22192"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2022-22239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22239"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22241"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2019-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2435"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2022-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22226"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2022-22229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22229"
},
{
"name": "CVE-2018-20534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20534"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22225"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2022-22245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22245"
},
{
"name": "CVE-2022-25314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2018-10689",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10689"
},
{
"name": "CVE-2016-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2124"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-25705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0847"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2022-22232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22232"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-12321",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12321"
},
{
"name": "CVE-2022-22240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22240"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22234"
},
{
"name": "CVE-2022-22242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22242"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2022-22251",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22251"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2022-22244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22244"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2022-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22233"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-45417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45417"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2018-20533",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20533"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2022-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22224"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-25211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25211"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22247"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2019-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0205"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2022-22199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22199"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2022-22236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22236"
},
{
"name": "CVE-2020-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7053"
},
{
"name": "CVE-2022-22248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22248"
},
{
"name": "CVE-2019-9518",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9518"
},
{
"name": "CVE-2022-22220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22220"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22228"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2020-14351",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14351"
},
{
"name": "CVE-2020-25709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2022-22223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22223"
},
{
"name": "CVE-2020-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25645"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2020-25717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25717"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2021-41617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-2684",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2684"
},
{
"name": "CVE-2021-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0543"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2022-22231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22231"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2022-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22235"
},
{
"name": "CVE-2020-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0427"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2022-22211",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22211"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2022-22230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22230"
},
{
"name": "CVE-2022-22237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22237"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
}
],
"initial_release_date": "2022-10-13T00:00:00",
"last_revision_date": "2022-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69906",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-MX-Series-An-FPC-crash-might-be-seen-due-to-mac-moves-within-the-same-bridge-domain-CVE-2022-22249"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69885",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-UTM-Enhanced-Content-Filtering-and-AntiVirus-are-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22231"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69888",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69886",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-If-Unified-Threat-Management-UTM-Enhanced-Content-Filtering-CF-is-enabled-and-specific-traffic-is-processed-the-PFE-will-crash-CVE-2022-22232"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69899",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69881",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-SBR-Carrier-Multiple-Vulnerabilities-resolved-in-version-8-6-0R16-64-bit-Solaris-and-Linux-editions"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69894",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-rpd-process-will-crash-when-a-malformed-incoming-RESV-message-is-processed-CVE-2022-22238"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69898",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-core-upon-receipt-of-a-specific-EVPN-route-by-a-BGP-route-reflector-in-an-EVPN-environment-CVE-2022-22199"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69895",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-The-ssh-CLI-command-always-runs-as-root-which-can-lead-to-privilege-escalation-CVE-2022-22239"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69908",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-cSRX-Series-Storing-Passwords-in-a-Recoverable-Format-and-software-permissions-issues-allows-a-local-attacker-to-elevate-privileges-CVE-2022-22251"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69874",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PPMD-goes-into-infinite-loop-upon-receipt-of-malformed-OSPF-TLV-CVE-2022-22224"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69902",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Due-to-a-race-condition-the-rpd-process-can-crash-upon-receipt-of-a-BGP-update-message-containing-flow-spec-route-CVE-2022-22220"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69879",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-crash-can-occur-due-to-memory-corruption-caused-by-flapping-BGP-sessions-CVE-2022-22208"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69890",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX2300-and-EX3400-Series-One-of-more-SFPs-might-become-unavailable-when-the-system-is-very-busy-CVE-2022-22234"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69875",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BGP-multipath-scenario-when-one-of-the-contributing-routes-is-flapping-often-and-rapidly-rpd-may-crash-CVE-2022-22225"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69915",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-An-attacker-can-cause-a-kernel-panic-by-sending-a-malformed-TCP-packet-to-the-device-CVE-2022-22192"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69878",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Specific-IPv6-transit-traffic-gets-exceptioned-to-the-routing-engine-which-will-cause-increased-CPU-utilization-CVE-2022-22227"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69907",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-FPC-might-crash-and-reload-if-the-EVPN-MAC-entry-is-move-from-local-to-remote-CVE-2022-22250"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69891",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-A-flowd-core-will-be-observed-when-malformed-GPRS-traffic-is-processed-CVE-2022-22235"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69882",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-2R1-release"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69876",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-EX4300-MP-EX4600-QFX5000-Series-In-VxLAN-scenarios-specific-packets-processed-cause-a-memory-leak-leading-to-a-PFE-crash-CVE-2022-22226"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69892",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-When-specific-valid-SIP-packets-are-received-the-PFE-will-crash-CVE-2022-22236"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69889",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69887",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-an-SR-to-LDP-interworking-scenario-with-SRMS-when-a-specific-low-privileged-command-is-issued-on-an-ABR-rpd-will-crash-CVE-2022-22233"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69900",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX5000-Series-with-SPC3-SRX4000-Series-and-vSRX-When-PowerMode-IPsec-is-configured-the-PFE-will-crash-upon-receipt-of-a-malformed-ESP-packet-CVE-2022-22201"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69884",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-specific-OSPFv3-LSAs-CVE-2022-22230"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69901",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Upon-processing-of-a-genuine-packet-the-pkid-process-will-crash-during-CMPv2-auto-re-enrollment-CVE-2022-22218"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69905",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Incorrect-file-permissions-can-allow-low-privileged-user-to-cause-another-user-to-execute-arbitrary-commands-CVE-2022-22248"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69893",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Peers-not-configured-for-TCP-AO-can-establish-a-BGP-or-LDP-session-even-if-authentication-is-configured-locally-CVE-2022-22237"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69904",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-Kernel-processing-of-unvalidated-TCP-segments-could-lead-to-a-Denial-of-Service-DoS-CVE-2022-22247"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69880",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-On-IPv6-OAM-SRv6-network-enabled-devices-an-attacker-sending-a-specific-genuine-packet-to-an-IPv6-address-configured-on-the-device-may-cause-a-RPD-memory-leak-leading-to-an-RPD-core-CVE-2022-22228"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69873",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-QFX10000-Series-In-IP-MPLS-PHP-node-scenarios-upon-receipt-of-certain-crafted-packets-multiple-interfaces-in-LAG-configurations-may-detach-CVE-2022-22223"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69896",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-rpd-memory-leak-might-be-observed-while-running-a-specific-cli-command-in-a-RIB-sharding-scenario-CVE-2022-22240"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69897",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-release-2011-L5"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69916",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-Multiple-FPCs-become-unreachable-due-to-continuous-polling-of-specific-SNMP-OID-CVE-2022-22211"
},
{
"published_at": "2022-10-12",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69883",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Paragon-Active-Assurance-Formerly-Netrounds-Stored-Cross-site-Scripting-XSS-vulnerability-in-web-administration-CVE-2022-22229"
}
]
}
CERTFR-2021-AVI-492
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2021-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3543"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-29T00:00:00",
"last_revision_date": "2021-06-29T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-492",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4997-2 du 25 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4997-2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5000-2 du 25 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5000-2"
}
]
}
CERTFR-2021-AVI-640
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-08-19T00:00:00",
"last_revision_date": "2021-08-19T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-640",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3173 du 17 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3173"
}
]
}
CERTFR-2021-AVI-567
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-567",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2728 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2735 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2735"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2733 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2733"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2734 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2734"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2730 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2730"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2714 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2714"
}
]
}
CERTFR-2021-AVI-482
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 Stretch versions ant\u00e9rieures \u00e0 4.19.194-1~deb9u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian 9 Stretch versions ant\u00e9rieures \u00e0 4.9.272-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-30002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30002"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29265"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
}
],
"initial_release_date": "2021-06-24T00:00:00",
"last_revision_date": "2021-06-24T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-482",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2689 du 22 juin 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2689"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-2690 du 22 juin 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2690"
}
]
}
CERTFR-2021-AVI-475
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
}
],
"initial_release_date": "2021-06-21T00:00:00",
"last_revision_date": "2021-06-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-475",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212025-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212025-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212060-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212060-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212027-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212027-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212057-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212057-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212020-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212020-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212042-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212042-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212026-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212026-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212067-1 du 18 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212067-1/"
}
]
}
CERTFR-2021-AVI-535
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2019-25045",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25045"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-07-16T00:00:00",
"last_revision_date": "2021-07-16T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-535",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212324-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212324-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212349-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212349-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212361-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212361-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212344-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212344-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212367-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212367-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212352-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212352-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212372-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212372-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212325-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212325-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212366-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212366-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212368-1 du 15 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212368-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212332-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212332-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212303-1 du 13 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212303-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-202114764-1 du 13 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212321-1 du 14 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212321-1/"
}
]
}
CERTFR-2021-AVI-500
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-01T00:00:00",
"last_revision_date": "2021-07-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-500",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212208-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212208-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212202-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212202-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212198-1 du 1 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212198-1/"
}
]
}
CERTFR-2021-AVI-912
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM Qradar. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM 7.4.x versions ant\u00e9rieures \u00e0 7.4.3 Fix Pack 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM 7.3.x versions ant\u00e9rieures \u00e0 7.3.3 Fix Pack 10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-32027",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32027"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2019-12735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12735"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2018-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8029"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2021-28163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28163"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2018-11768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11768"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2020-13954",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13954"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-32028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32028"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2020-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7226"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2017-15713",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15713"
},
{
"name": "CVE-2017-15804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15804"
}
],
"initial_release_date": "2021-12-01T00:00:00",
"last_revision_date": "2021-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-912",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021.",
"revision_date": "2021-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Qradar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Qradar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520480 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520472 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6520674 du 30 novembre 2021",
"url": "https://www.ibm.com/support/pages/node/6520674"
}
]
}
CERTFR-2025-AVI-0529
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
| SUSE | N/A | Public Cloud Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | N/A | Basesystem Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Micro 6.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Micro 6.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP7 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
| SUSE | N/A | Legacy Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | Development Tools Module 15-SP7 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | Basesystem Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | Development Tools Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP7 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 LTSS",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"name": "CVE-2021-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3619"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2021-4159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2023-28866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28866"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2023-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
},
{
"name": "CVE-2023-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2023-47233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47233"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2021-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47100"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2021-47170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47170"
},
{
"name": "CVE-2024-27018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27018"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2021-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47220"
},
{
"name": "CVE-2021-47229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47229"
},
{
"name": "CVE-2021-47231",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47240"
},
{
"name": "CVE-2021-47246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47246"
},
{
"name": "CVE-2021-47252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47252"
},
{
"name": "CVE-2021-47255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47255"
},
{
"name": "CVE-2021-47260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47260"
},
{
"name": "CVE-2021-47288",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47288"
},
{
"name": "CVE-2021-47296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47296"
},
{
"name": "CVE-2021-47314",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47314"
},
{
"name": "CVE-2021-47315",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47315"
},
{
"name": "CVE-2021-47485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47485"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47511",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47511"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2024-35811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35811"
},
{
"name": "CVE-2024-35895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35895"
},
{
"name": "CVE-2024-35914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35914"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2024-35910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
},
{
"name": "CVE-2024-27415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27415"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2024-41005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2024-45021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
},
{
"name": "CVE-2024-46713",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
},
{
"name": "CVE-2024-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46752"
},
{
"name": "CVE-2024-46763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
},
{
"name": "CVE-2024-46782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
},
{
"name": "CVE-2024-46814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
},
{
"name": "CVE-2024-46865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46865"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50290",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
},
{
"name": "CVE-2024-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
},
{
"name": "CVE-2024-53063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
},
{
"name": "CVE-2024-50038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50038"
},
{
"name": "CVE-2024-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53135"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2024-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53168"
},
{
"name": "CVE-2024-56558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-56705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
},
{
"name": "CVE-2024-56779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2025-21648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21648"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2024-56633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2024-50140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50140"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53139"
},
{
"name": "CVE-2024-53163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53163"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2024-47408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47408"
},
{
"name": "CVE-2024-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49571"
},
{
"name": "CVE-2024-53680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
},
{
"name": "CVE-2024-56640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-56770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
},
{
"name": "CVE-2024-57900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57900"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49212"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49235"
},
{
"name": "CVE-2022-49248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49248"
},
{
"name": "CVE-2022-49253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49253"
},
{
"name": "CVE-2022-49320",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49320"
},
{
"name": "CVE-2022-49326",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49326"
},
{
"name": "CVE-2022-49371",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49371"
},
{
"name": "CVE-2022-49382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49382"
},
{
"name": "CVE-2022-49396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49396"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49445",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49445"
},
{
"name": "CVE-2022-49460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49460"
},
{
"name": "CVE-2022-49467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49467"
},
{
"name": "CVE-2022-49474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49474"
},
{
"name": "CVE-2022-49491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49491"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49563"
},
{
"name": "CVE-2022-49564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49564"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49652"
},
{
"name": "CVE-2022-49715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49715"
},
{
"name": "CVE-2022-49729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49729"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2024-56758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56758"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2025-21701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21701"
},
{
"name": "CVE-2025-21703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21703"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2022-49751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49751"
},
{
"name": "CVE-2023-52927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52927"
},
{
"name": "CVE-2023-52975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52975"
},
{
"name": "CVE-2023-52988",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52988"
},
{
"name": "CVE-2023-52989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52989"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2024-57947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57947"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2025-21850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21850"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21865"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2025-21702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21702"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21971"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21993"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22033"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22093"
},
{
"name": "CVE-2025-22095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22095"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2021-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47670"
},
{
"name": "CVE-2022-49110",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49110"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2022-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49767"
},
{
"name": "CVE-2023-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53051"
},
{
"name": "CVE-2024-35840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35840"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2025-21729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21729"
},
{
"name": "CVE-2025-21755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21755"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21852"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-21923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21923"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22029"
},
{
"name": "CVE-2025-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22036"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22064"
},
{
"name": "CVE-2025-22065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22065"
},
{
"name": "CVE-2025-22080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22080"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2025-22106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-22108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22108"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-37860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2022-49190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49190"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37782"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-37929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37929"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37953"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-49769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49769"
},
{
"name": "CVE-2022-49770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49770"
},
{
"name": "CVE-2022-49771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49771"
},
{
"name": "CVE-2022-49772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49772"
},
{
"name": "CVE-2022-49775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49775"
},
{
"name": "CVE-2022-49776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49776"
},
{
"name": "CVE-2022-49777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49777"
},
{
"name": "CVE-2022-49779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49779"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2022-49787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49787"
},
{
"name": "CVE-2022-49788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
},
{
"name": "CVE-2022-49789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49789"
},
{
"name": "CVE-2022-49790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49790"
},
{
"name": "CVE-2022-49792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49792"
},
{
"name": "CVE-2022-49793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49793"
},
{
"name": "CVE-2022-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49794"
},
{
"name": "CVE-2022-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49796"
},
{
"name": "CVE-2022-49797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49797"
},
{
"name": "CVE-2022-49799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49799"
},
{
"name": "CVE-2022-49800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49800"
},
{
"name": "CVE-2022-49801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49801"
},
{
"name": "CVE-2022-49802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49802"
},
{
"name": "CVE-2022-49807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49807"
},
{
"name": "CVE-2022-49809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49809"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2022-49812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49812"
},
{
"name": "CVE-2022-49813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49813"
},
{
"name": "CVE-2022-49818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49818"
},
{
"name": "CVE-2022-49821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49821"
},
{
"name": "CVE-2022-49822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49822"
},
{
"name": "CVE-2022-49823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49823"
},
{
"name": "CVE-2022-49824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49824"
},
{
"name": "CVE-2022-49825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49825"
},
{
"name": "CVE-2022-49826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49826"
},
{
"name": "CVE-2022-49827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49827"
},
{
"name": "CVE-2022-49830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49830"
},
{
"name": "CVE-2022-49832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49832"
},
{
"name": "CVE-2022-49834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49834"
},
{
"name": "CVE-2022-49835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49835"
},
{
"name": "CVE-2022-49836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49836"
},
{
"name": "CVE-2022-49839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49839"
},
{
"name": "CVE-2022-49841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49841"
},
{
"name": "CVE-2022-49842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49842"
},
{
"name": "CVE-2022-49845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49845"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2022-49850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49850"
},
{
"name": "CVE-2022-49853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49853"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2022-49860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49860"
},
{
"name": "CVE-2022-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49861"
},
{
"name": "CVE-2022-49863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49863"
},
{
"name": "CVE-2022-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49864"
},
{
"name": "CVE-2022-49865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49865"
},
{
"name": "CVE-2022-49868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49868"
},
{
"name": "CVE-2022-49869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49869"
},
{
"name": "CVE-2022-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49870"
},
{
"name": "CVE-2022-49871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49871"
},
{
"name": "CVE-2022-49874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49874"
},
{
"name": "CVE-2022-49879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49879"
},
{
"name": "CVE-2022-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49880"
},
{
"name": "CVE-2022-49881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49881"
},
{
"name": "CVE-2022-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49885"
},
{
"name": "CVE-2022-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49887"
},
{
"name": "CVE-2022-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49888"
},
{
"name": "CVE-2022-49889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49889"
},
{
"name": "CVE-2022-49890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49890"
},
{
"name": "CVE-2022-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49891"
},
{
"name": "CVE-2022-49892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49892"
},
{
"name": "CVE-2022-49900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49900"
},
{
"name": "CVE-2022-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49905"
},
{
"name": "CVE-2022-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49906"
},
{
"name": "CVE-2022-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49908"
},
{
"name": "CVE-2022-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49909"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2022-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49915"
},
{
"name": "CVE-2022-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49916"
},
{
"name": "CVE-2022-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49922"
},
{
"name": "CVE-2022-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49923"
},
{
"name": "CVE-2022-49924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49924"
},
{
"name": "CVE-2022-49925",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49925"
},
{
"name": "CVE-2022-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49927"
},
{
"name": "CVE-2022-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49928"
},
{
"name": "CVE-2022-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49931"
},
{
"name": "CVE-2023-53035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53035"
},
{
"name": "CVE-2023-53038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53038"
},
{
"name": "CVE-2023-53039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53039"
},
{
"name": "CVE-2023-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53040"
},
{
"name": "CVE-2023-53041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
},
{
"name": "CVE-2023-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53044"
},
{
"name": "CVE-2023-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53045"
},
{
"name": "CVE-2023-53049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53049"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2023-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53054"
},
{
"name": "CVE-2023-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53056"
},
{
"name": "CVE-2023-53058",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53058"
},
{
"name": "CVE-2023-53059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53059"
},
{
"name": "CVE-2023-53060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53060"
},
{
"name": "CVE-2023-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53062"
},
{
"name": "CVE-2023-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53064"
},
{
"name": "CVE-2023-53065",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53065"
},
{
"name": "CVE-2023-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53066"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2023-53075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53075"
},
{
"name": "CVE-2023-53077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53077"
},
{
"name": "CVE-2023-53078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53078"
},
{
"name": "CVE-2023-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53079"
},
{
"name": "CVE-2023-53081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53081"
},
{
"name": "CVE-2023-53084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53084"
},
{
"name": "CVE-2023-53087",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53087"
},
{
"name": "CVE-2023-53089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53089"
},
{
"name": "CVE-2023-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53090"
},
{
"name": "CVE-2023-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53091"
},
{
"name": "CVE-2023-53092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53092"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2023-53096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53096"
},
{
"name": "CVE-2023-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53098"
},
{
"name": "CVE-2023-53099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53099"
},
{
"name": "CVE-2023-53100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53100"
},
{
"name": "CVE-2023-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53101"
},
{
"name": "CVE-2023-53106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53106"
},
{
"name": "CVE-2023-53108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53108"
},
{
"name": "CVE-2023-53111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53111"
},
{
"name": "CVE-2023-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53114"
},
{
"name": "CVE-2023-53116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53116"
},
{
"name": "CVE-2023-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53118"
},
{
"name": "CVE-2023-53119",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53119"
},
{
"name": "CVE-2023-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53123"
},
{
"name": "CVE-2023-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53124"
},
{
"name": "CVE-2023-53125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53125"
},
{
"name": "CVE-2023-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53131"
},
{
"name": "CVE-2023-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53134"
},
{
"name": "CVE-2023-53137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53137"
},
{
"name": "CVE-2023-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53139"
},
{
"name": "CVE-2023-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53140"
},
{
"name": "CVE-2023-53142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53142"
},
{
"name": "CVE-2023-53143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53143"
},
{
"name": "CVE-2023-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53145"
},
{
"name": "CVE-2025-22030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22030"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2025-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22070"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-37804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37804"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2020-36790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36790"
},
{
"name": "CVE-2020-36791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36791"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49761"
},
{
"name": "CVE-2022-49762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49762"
},
{
"name": "CVE-2022-49763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49763"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2022-49781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49781"
},
{
"name": "CVE-2022-49784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49784"
},
{
"name": "CVE-2022-49786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49786"
},
{
"name": "CVE-2022-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49795"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2022-49837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49837"
},
{
"name": "CVE-2022-49840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49840"
},
{
"name": "CVE-2022-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49862"
},
{
"name": "CVE-2022-49872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49872"
},
{
"name": "CVE-2022-49877",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49877"
},
{
"name": "CVE-2022-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49886"
},
{
"name": "CVE-2022-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49898"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2022-49902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49902"
},
{
"name": "CVE-2022-49907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49907"
},
{
"name": "CVE-2022-49913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49913"
},
{
"name": "CVE-2022-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49914"
},
{
"name": "CVE-2022-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49917"
},
{
"name": "CVE-2022-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49918"
},
{
"name": "CVE-2022-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49921"
},
{
"name": "CVE-2022-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49929"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2023-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53057"
},
{
"name": "CVE-2023-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53070"
},
{
"name": "CVE-2023-53071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53071"
},
{
"name": "CVE-2023-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53073"
},
{
"name": "CVE-2023-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53074"
},
{
"name": "CVE-2023-53080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53080"
},
{
"name": "CVE-2023-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53082"
},
{
"name": "CVE-2023-53094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53094"
},
{
"name": "CVE-2023-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53095"
},
{
"name": "CVE-2023-53102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53102"
},
{
"name": "CVE-2023-53103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53103"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2023-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53109"
},
{
"name": "CVE-2023-53112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53112"
},
{
"name": "CVE-2023-53121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53121"
},
{
"name": "CVE-2023-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53128"
},
{
"name": "CVE-2023-53141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53141"
},
{
"name": "CVE-2023-53146",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53146"
},
{
"name": "CVE-2024-49570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49570"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2024-58091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58091"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2024-58099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58099"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2025-21717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21717"
},
{
"name": "CVE-2025-21800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21800"
},
{
"name": "CVE-2025-21837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21837"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-21882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21882"
},
{
"name": "CVE-2025-21893",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21893"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-21973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21973"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-21989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21989"
},
{
"name": "CVE-2025-21990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21990"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2025-22085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22085"
},
{
"name": "CVE-2025-22091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22091"
},
{
"name": "CVE-2025-22094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22094"
},
{
"name": "CVE-2025-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22112"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-22117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22117"
},
{
"name": "CVE-2025-22118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22118"
},
{
"name": "CVE-2025-22119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22119"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23134"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23154"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-38240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38240"
},
{
"name": "CVE-2025-40014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40014"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
}
],
"initial_release_date": "2025-06-20T00:00:00",
"last_revision_date": "2025-06-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0529",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01951-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501951-1"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01995-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501995-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01964-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501964-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01948-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501948-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01958-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501958-1"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01982-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501982-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01944-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501944-1"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01972-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501972-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01950-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501950-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20413-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520413-1"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:02000-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502000-1"
},
{
"published_at": "2025-06-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20419-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520419-1"
},
{
"published_at": "2025-06-17",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01983-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501983-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20421-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520421-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01965-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501965-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01949-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501949-1"
},
{
"published_at": "2025-06-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:20408-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520408-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01957-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501957-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01967-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501967-1"
},
{
"published_at": "2025-06-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01966-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01956-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501956-1"
}
]
}
CERTFR-2022-AVI-265
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2018-5995",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5995"
},
{
"name": "CVE-2020-12655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-45402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45402"
},
{
"name": "CVE-2022-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0264"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2016-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2854"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0382"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2019-19449",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19449"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2016-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2853"
},
{
"name": "CVE-2021-39648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39648"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2022-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0742"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-265",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nUbuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5343-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5339-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5339-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5338-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5338-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5337-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5337-1"
}
]
}
CERTFR-2021-AVI-680
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38201"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-08T00:00:00",
"last_revision_date": "2021-09-08T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-680",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3446 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3446"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3445 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3445"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3444 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3444"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3447 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3447"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3440 du 07 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3440"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3363 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3363"
}
]
}
CERTFR-2021-AVI-720
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services for SAP Solutions 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-21T00:00:00",
"last_revision_date": "2021-09-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-720",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:3522 du 14 septembre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3522"
}
]
}
CERTFR-2021-AVI-570
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-23T00:00:00",
"last_revision_date": "2021-07-23T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-570",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212453-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212451-1 du 22 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
}
]
}
CERTFR-2021-AVI-584
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
}
],
"initial_release_date": "2021-08-02T00:00:00",
"last_revision_date": "2021-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212577-1 du 30 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
}
]
}
CERTFR-2023-AVI-0051
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | NorthStar Controller versions antérieures à 6.2.3 | ||
| Juniper Networks | N/A | Contrail Cloud versions antérieures à 13.7.0 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO | ||
| Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration (CSO) versions antérieures à 6.3.0 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1 | ||
| Juniper Networks | Junos Space | Junos Space versions antérieures à 22.3R1 | ||
| Juniper Networks | N/A | Cloud Native Contrail Networking versions antérieures à R22.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NorthStar Controller versions ant\u00e9rieures \u00e0 6.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Contrail Cloud versions ant\u00e9rieures \u00e0 13.7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.2R3-EVO, 19.3R3-EVO, 19.4R3-EVO, 20.1R3-EVO, 20.2R2-EVO, 20.3R1-EVO, 20.4R2-EVO, 20.4R3-S3-EVO, 20.4R3-S4-EVO, 21.1R2-EVO, 21.2R1-EVO, 21.2R3-S4-EVO, 21.3R2-EVO, 21.3R3-EVO, 21.3R3-S1-EVO, 21.4R1-EVO, 21.4R2-EVO, 21.4R2-S1-EVO, 21.4R2-S2-EVO, 21.4R3-EVO, 22.1R1-EVO, 22.1R1-S2-EVO, 22.1R2-EVO, 22.1R3-EVO, 22.2R1-EVO, 22.2R1-S1-EVO, 22.2R2-EVO et 22.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Service Orchestration (CSO) versions ant\u00e9rieures \u00e0 6.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1R7-S12, 18.4R2-S7, 19.1R3-S2, 19.1R3-S9, 19.2R1-S9, 19.2R3, 19.2R3-S5, 19.2R3-S6, 19.3R3, 19.3R3-S6, 19.3R3-S7, 19.4R2-S7, 19.4R2-S8, 19.4R3, 19.4R3-S10, 19.4R3-S8, 19.4R3-S9, 20.1R2, 20.1R3-S4, 20.2R2, 20.2R3-S5, 20.2R3-S6, 20.2R3-S7, 20.3R1, 20.3R3-S4, 20.3R3-S5, 20.3R3-S6, 20.4R1, 20.4R3-S3, 20.4R3-S4, 20.4R3-S5, 21.1R1-S1, 21.1R2, 21.1R3, 21.1R3-S3, 21.1R3-S4, 21.1R3-S5, 21.2R1, 21.2R3, 21.2R3-S1, 21.2R3-S2, 21.2R3-S3, 21.3R2, 21.3R3, 21.3R3-S1, 21.3R3-S2, 21.3R3-S3, 21.4R2, 21.4R2-S1, 21.4R2-S2, 21.4R3, 21.4R3-S1, 21.4R3-S2, 22.1R1, 22.1R1-S2, 22.1R2, 22.1R2-S1, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.2R1, 22.2R1-S1, 22.2R1-S2, 22.2R2, 22.2R3, 22.3R1, 22.3R1-S1, 22.3R2 et 22.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space versions ant\u00e9rieures \u00e0 22.3R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Cloud Native Contrail Networking versions ant\u00e9rieures \u00e0 R22.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2019-1543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1543"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-11668",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11668"
},
{
"name": "CVE-2020-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0543"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14573"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14562"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2020-14145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2020-8698",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8698"
},
{
"name": "CVE-2020-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8696"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0466"
},
{
"name": "CVE-2020-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0465"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2020-8695",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8695"
},
{
"name": "CVE-2019-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20934"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-12363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12363"
},
{
"name": "CVE-2020-12362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12362"
},
{
"name": "CVE-2020-12364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12364"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-35498",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35498"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23017"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2020-27827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27827"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-39275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39275"
},
{
"name": "CVE-2021-34798",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34798"
},
{
"name": "CVE-2021-40438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40438"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26691"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-44790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44790"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21277"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-4034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4034"
},
{
"name": "CVE-2021-4028",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4028"
},
{
"name": "CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"name": "CVE-2022-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38177"
},
{
"name": "CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-38178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38178"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2021-46143",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2022-25315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
},
{
"name": "CVE-2022-25235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
},
{
"name": "CVE-2022-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22720"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30465"
},
{
"name": "CVE-2021-42574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42574"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21549",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21549"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2007-6755",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6755"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-3765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3765"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2019-11287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11287"
},
{
"name": "CVE-2023-22397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22397"
},
{
"name": "CVE-2023-22403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22403"
},
{
"name": "CVE-2023-22398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22398"
},
{
"name": "CVE-2023-22399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22399"
},
{
"name": "CVE-2023-22417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22417"
},
{
"name": "CVE-2023-22395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22395"
},
{
"name": "CVE-2023-22391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22391"
},
{
"name": "CVE-2023-22409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22409"
},
{
"name": "CVE-2023-22407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22407"
},
{
"name": "CVE-2023-22414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22414"
},
{
"name": "CVE-2023-22393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22393"
},
{
"name": "CVE-2023-22415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22415"
},
{
"name": "CVE-2023-22405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22405"
},
{
"name": "CVE-2023-22412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22412"
},
{
"name": "CVE-2020-24489",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24489"
},
{
"name": "CVE-2023-22404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22404"
},
{
"name": "CVE-2021-3504",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3504"
},
{
"name": "CVE-2023-22394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22394"
},
{
"name": "CVE-2023-22406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22406"
},
{
"name": "CVE-2018-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8046"
},
{
"name": "CVE-2007-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2285"
},
{
"name": "CVE-2021-35940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35940"
},
{
"name": "CVE-2023-22411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22411"
},
{
"name": "CVE-2023-22401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22401"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2023-22396",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22396"
},
{
"name": "CVE-2023-22402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22402"
},
{
"name": "CVE-2021-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3621"
},
{
"name": "CVE-2023-22400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22400"
},
{
"name": "CVE-2023-22408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22408"
},
{
"name": "CVE-2022-0934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0934"
},
{
"name": "CVE-2021-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40085"
},
{
"name": "CVE-2023-22410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22410"
},
{
"name": "CVE-2023-22416",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22416"
},
{
"name": "CVE-2023-22413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22413"
}
],
"initial_release_date": "2023-01-23T00:00:00",
"last_revision_date": "2023-01-23T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70195 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10K-Series-PFE-crash-upon-receipt-of-specific-genuine-packets-when-sFlow-is-enabled-CVE-2023-22399?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70183 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Cloud-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Cloud-release-13-7-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70203 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-An-RPD-crash-can-happen-due-to-an-MPLS-TE-tunnel-configuration-change-on-a-directly-connected-router-CVE-2023-22407?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70192 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Receipt-of-crafted-TCP-packets-on-Ethernet-console-port-results-in-MBUF-leak-leading-to-Denial-of-Service-DoS-CVE-2023-22396?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70213 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-A-memory-leak-might-be-observed-in-IPsec-VPN-scenario-leading-to-an-FPC-crash-CVE-2023-22417?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70193 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-PTX10003-An-attacker-sending-specific-genuine-packets-will-cause-a-memory-leak-in-the-PFE-leading-to-a-Denial-of-Service-CVE-2023-22397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70181 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-might-crash-when-MPLS-ping-is-performed-on-BGP-LSPs-CVE-2023-22398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70186 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70179 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Northstar-Controller-Pivotal-RabbitMQ-contains-a-web-management-plugin-that-is-vulnerable-to-a-Denial-of-Service-DoS-attack-CVE-2019-11287?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70208 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flowd-daemon-will-crash-if-the-SIP-ALG-is-enabled-and-specific-SIP-messages-are-processed-CVE-2023-22412?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70201 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX5k-Series-EX46xx-Series-MAC-limiting-feature-stops-working-after-PFE-restart-device-reboot--CVE-2023-22405?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70209 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-FPC-crash-when-an-IPsec6-tunnel-processes-specific-IPv4-packets-CVE-2023-22413?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70187 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-ACX2K-Series-Receipt-of-a-high-rate-of-specific-traffic-will-lead-to-a-Denial-of-Service-DoS-CVE-2023-22391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70199 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-QFX10k-Series-ICCP-flap-will-be-observed-due-to-excessive-specific-traffic-CVE-2023-22403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70180 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-OpenSSL-Infinite-loop-in-BN-mod-sqrt-reachable-when-parsing-certificates-CVE-2022-0778?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70198 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-The-kernel-might-restart-in-a-BGP-scenario-where-bgp-auto-discovery-is-enabled-and-such-a-neighbor-flaps-CVE-2023-22402?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70196 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-Evolved-A-specific-SNMP-GET-operation-and-a-specific-CLI-commands-cause-resources-to-leak-and-eventually-the-evo-pfemand-process-will-crash-CVE-2023-22400?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70197 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-PTX10008-PTX10016-When-a-specific-SNMP-MIB-is-queried-the-FPC-will-crash-CVE-2023-22401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70202 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-memory-leak-which-will-ultimately-lead-to-an-rpd-crash-will-be-observed-when-a-peer-interface-flaps-continuously-in-a-Segment-Routing-scenario-CVE-2023-22406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70190 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Memory-leak-due-to-receipt-of-specially-crafted-SIP-calls-CVE-2023-22394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70191 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-In-an-MPLS-scenario-the-processing-of-specific-packets-to-the-device-causes-a-buffer-leak-and-ultimately-a-loss-of-connectivity-CVE-2023-22395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA69903 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Contrail-Networking-Multiple-Vulnerabilities-have-been-resolved-in-Contrail-Networking-R22-3?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70204 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Upon-processing-of-a-specific-SIP-packet-an-FPC-can-crash-CVE-2023-22408?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70200 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-When-IPsec-VPN-is-configured-iked-will-core-when-a-specifically-formatted-payload-is-received-CVE-2023-22404?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70212 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-if-SIP-ALG-is-enabled-and-a-malicious-SIP-packet-is-received-CVE-2023-22416?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70185 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70211 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-and-SRX-Series-The-flow-processing-daemon-flowd-will-crash-when-a-specific-H-323-packet-is-received-CVE-2023-22415?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70210 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-PTX-Series-and-QFX10000-Series-An-FPC-memory-leak-is-observed-when-specific-multicast-packets-are-processed-CVE-2023-22414?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70206 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-MX-Series-with-MPC10-MPC11-When-Suspicious-Control-Flow-Detection-scfd-is-enabled-and-an-attacker-is-sending-specific-traffic-this-causes-a-memory-leak-CVE-2023-22410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70205 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-SPC3-When-an-inconsistent-NAT-configuration-exists-and-a-specific-CLI-command-is-issued-the-SPC-will-reboot-CVE-2023-22409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70182 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70189 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crash-upon-receipt-of-BGP-route-with-invalid-next-hop-CVE-2023-22393?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA70207 du 11 janvier 2023",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-OS-SRX-Series-The-flowd-daemon-will-crash-when-Unified-Policies-are-used-with-IPv6-and-certain-dynamic-applications-are-rejected-by-the-device-CVE-2023-22411?language=en_US"
}
]
}
CERTFR-2021-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"name": "CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-07-22T00:00:00",
"last_revision_date": "2021-07-22T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33624"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212427-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212427-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212422-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212422-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212421-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0605"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-35039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35039"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212426-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212426-1/"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212433-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212433-1"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"title": "R\u00e9f\u00e9rence CVE CVE-2020-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36386"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20212438-1 du 21 juillet 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212438-1/"
}
],
"reference": "CERTFR-2021-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": []
}
CERTFR-2021-AVI-752
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-10-06T00:00:00",
"last_revision_date": "2021-10-06T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-752",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3725 du 05 octobre 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3725"
}
]
}
CERTFR-2021-AVI-452
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-10T00:00:00",
"last_revision_date": "2021-06-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-452",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211913-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211913-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211912-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211912-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211899-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211899-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211888-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211888-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211887-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211887-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211889-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211889-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211891-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211891-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211915-1 du 09 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211915-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211890-1 du 08 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211890-1/"
}
]
}
CERTFR-2021-AVI-469
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-30002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30002"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2020-36312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36312"
},
{
"name": "CVE-2020-36311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36311"
},
{
"name": "CVE-2021-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27363"
},
{
"name": "CVE-2021-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3490"
},
{
"name": "CVE-2021-27364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27364"
},
{
"name": "CVE-2021-29647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-28971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28971"
},
{
"name": "CVE-2020-35519",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35519"
},
{
"name": "CVE-2020-27815",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27815"
},
{
"name": "CVE-2021-28952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28952"
},
{
"name": "CVE-2020-36310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36310"
},
{
"name": "CVE-2021-27365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27365"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2020-27170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27170"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-29265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29265"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-28038",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28038"
},
{
"name": "CVE-2019-19769",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19769"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-3489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3489"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-20268",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20268"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2019-18814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18814"
},
{
"name": "CVE-2021-28660",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28660"
},
{
"name": "CVE-2021-3491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3491"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-28964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28964"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2020-27673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27673"
},
{
"name": "CVE-2020-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27171"
},
{
"name": "CVE-2021-28375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28375"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-17T00:00:00",
"last_revision_date": "2021-06-17T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-469",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211977-1 du 15 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211977-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20211975-1 du 15 juin 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211975-1"
}
]
}
CERTFR-2021-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27777"
},
{
"name": "CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2021-09-01T00:00:00",
"last_revision_date": "2021-09-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3321 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3321"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3327 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3327"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3375 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3328"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3320 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3320"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2021:3399 du 31 ao\u00fbt 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:3399"
}
]
}
CERTFR-2022-AVI-048
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (pour IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (pour IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0185"
},
{
"name": "CVE-2021-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36385"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
}
],
"initial_release_date": "2022-01-19T00:00:00",
"last_revision_date": "2022-01-19T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2022:0176 du 19 janvier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0176"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Red Hat RHSA-2022:0157 du 18 janvier 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:0157"
}
]
}
CERTFR-2021-AVI-483
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3600"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31440"
},
{
"name": "CVE-2021-3543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3543"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23133"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29155"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2021-06-24T00:00:00",
"last_revision_date": "2021-06-24T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-483",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-4997-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4997-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5003-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5003-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-4999-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-4999-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5001-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5001-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5000-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5000-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux d\u0027Ubuntu USN-5002-1 du 23 juin 2021",
"url": "https://ubuntu.com/security/notices/USN-5002-1"
}
]
}
CERTFR-2021-AVI-552
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2020-24587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-3587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3587"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2020-24586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24586"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-33200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33200"
},
{
"name": "CVE-2021-31829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31829"
},
{
"name": "CVE-2021-28691",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28691"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-552",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5014-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5014-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5016-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5016-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5017-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5017-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5018-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5018-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5015-1 du 20 juillet 2021",
"url": "https://ubuntu.com/security/notices/USN-5015-1"
}
]
}
CERTFR-2021-AVI-551
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2020-25704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25704"
},
{
"name": "CVE-2020-35508",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35508"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3347"
},
{
"name": "CVE-2020-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28374"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2021-07-21T00:00:00",
"last_revision_date": "2021-07-21T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-551",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2722 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2722"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2715 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2715"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2719 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2719"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2021:2732 du 20 juillet 2021",
"url": "https://access.redhat.com/errata/RHSA-2021:2732"
}
]
}
suse-su-2021:1913-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1913,SUSE-SLE-HA-12-SP5-2021-1913,SUSE-SLE-Live-Patching-12-SP5-2021-1913,SUSE-SLE-SDK-12-SP5-2021-1913,SUSE-SLE-SERVER-12-SP5-2021-1913,SUSE-SLE-WE-12-SP5-2021-1913",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1913-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1913-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211913-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1913-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183754",
"url": "https://bugzilla.suse.com/1183754"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184040",
"url": "https://bugzilla.suse.com/1184040"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185827",
"url": "https://bugzilla.suse.com/1185827"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186452",
"url": "https://bugzilla.suse.com/1186452"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186487",
"url": "https://bugzilla.suse.com/1186487"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-09T11:55:09Z",
"generator": {
"date": "2021-06-09T11:55:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1913-1",
"initial_release_date": "2021-06-09T11:55:09Z",
"revision_history": [
{
"date": "2021-06-09T11:55:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.74.1.noarch",
"product_id": "kernel-devel-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.74.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.74.2.noarch",
"product_id": "kernel-docs-4.12.14-122.74.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.74.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.74.2.noarch",
"product_id": "kernel-docs-html-4.12.14-122.74.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.74.1.noarch",
"product_id": "kernel-macros-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.74.1.noarch",
"product_id": "kernel-source-4.12.14-122.74.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.74.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.74.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.74.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.s390x",
"product_id": "kernel-syms-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.74.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.74.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.74.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.74.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.74.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.74.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.74.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:55:09Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2421-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2421-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2421-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187554",
"url": "https://bugzilla.suse.com/1187554"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-21T09:01:19Z",
"generator": {
"date": "2021-07-21T09:01:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2421-1",
"initial_release_date": "2021-07-21T09:01:19Z",
"revision_history": [
{
"date": "2021-07-21T09:01:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.75.1.noarch",
"product_id": "kernel-devel-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.75.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.75.1.noarch",
"product_id": "kernel-macros-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-4.12.14-150.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.75.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.s390x",
"product_id": "kernel-syms-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.75.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-33624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33624"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33624",
"url": "https://www.suse.com/security/cve/CVE-2021-33624"
},
{
"category": "external",
"summary": "SUSE Bug 1187554 for CVE-2021-33624",
"url": "https://bugzilla.suse.com/1187554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-33624"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-21T09:01:19Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:14764-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-0512: Fixed a possible out of bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861 bsc#1185863)\n- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859 bsc#1185863)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1185863 bsc#1186062)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862 bsc#1185863)\n\nThe following non-security bugs were fixed:\n\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kernel-source-14764,slexsp3-kernel-source-14764",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14764-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:14764-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114764-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:14764-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-13T07:46:15Z",
"generator": {
"date": "2021-07-13T07:46:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:14764-1",
"initial_release_date": "2021-07-13T07:46:15Z",
"revision_history": [
{
"date": "2021-07-13T07:46:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.129.1.i586",
"product_id": "kernel-default-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.129.1.i586",
"product_id": "kernel-default-base-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.129.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.129.1.i586",
"product_id": "kernel-ec2-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.129.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.129.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.129.1.i586",
"product_id": "kernel-pae-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.129.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.129.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.129.1.i586",
"product_id": "kernel-source-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.129.1.i586",
"product_id": "kernel-syms-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.129.1.i586",
"product_id": "kernel-trace-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.129.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.129.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.129.1.i586",
"product_id": "kernel-xen-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.129.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.129.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.129.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.129.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.129.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.129.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.129.1.ppc64",
"product_id": "kernel-default-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.129.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.129.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.129.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.129.1.ppc64",
"product_id": "kernel-source-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.129.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.129.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.129.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.129.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.129.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.129.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.129.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.129.1.s390x",
"product_id": "kernel-default-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.129.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.129.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.129.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.129.1.s390x",
"product_id": "kernel-source-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.129.1.s390x",
"product_id": "kernel-syms-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.129.1.s390x",
"product_id": "kernel-trace-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.129.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.129.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.129.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.129.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.129.1.x86_64",
"product_id": "kernel-default-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.129.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.129.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.129.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.129.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.129.1.x86_64",
"product_id": "kernel-source-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.129.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.129.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.129.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.129.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.129.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.129.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.129.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.129.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.129.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.129.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.129.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.129.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.129.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.129.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.129.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.129.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-13T07:46:15Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
}
]
}
suse-su-2021:1977-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 -\u003e (bsc#1152489) Backporting notes: \t* rename amd/pm to amd/powerplay \t* context changes\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999). \n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1977,SUSE-SLE-Module-Basesystem-15-SP3-2021-1977,SUSE-SLE-Module-Development-Tools-15-SP3-2021-1977,SUSE-SLE-Module-Legacy-15-SP3-2021-1977,SUSE-SLE-Module-Live-Patching-15-SP3-2021-1977,SUSE-SLE-Product-HA-15-SP3-2021-1977,SUSE-SLE-Product-WE-15-SP3-2021-1977",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1977-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1977-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211977-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1977-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-15T11:06:36Z",
"generator": {
"date": "2021-06-15T11:06:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1977-1",
"initial_release_date": "2021-06-15T11:06:36Z",
"revision_history": [
{
"date": "2021-06-15T11:06:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product_id": "kernel-devel-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-html-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product_id": "kernel-macros-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-extra-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-optional-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product_id": "kernel-syms-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_5-preempt-1-7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.5.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "low"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_5-default-1-7.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.5.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.5.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:06:36Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2198-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bsc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bsc#1185641).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bsc#1184611).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185847).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2198,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2198",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2198-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2198-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212198-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2198-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185856",
"url": "https://bugzilla.suse.com/1185856"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)",
"tracking": {
"current_release_date": "2021-06-29T08:59:01Z",
"generator": {
"date": "2021-06-29T08:59:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2198-1",
"initial_release_date": "2021-06-29T08:59:01Z",
"revision_history": [
{
"date": "2021-06-29T08:59:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-57-default-2-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-57-preempt-2-3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-57-preempt-2-3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-57-preempt-2-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-57-default-2-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-57-default-2-3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-29T08:59:01Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
}
]
}
suse-su-2021:1912-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kabi: Fix breakage in NVMe driver (bsc#1181161).\n- kabi: Fix nvmet error log definitions (bsc#1181161).\n- kabi: nvme: fix fast_io_fail_tmo (bsc#1181161).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nvme-fabrics: allow to queue requests for live queues (bsc#1181161).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1181161).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-pci: Sync queues on reset (bsc#1181161).\n- nvme-rdma: avoid race between time out and tear down (bsc#1181161).\n- nvme-rdma: avoid repeated request completion (bsc#1181161).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1181161).\n- nvme-rdma: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-rdma: fix timeout handler (bsc#1181161).\n- nvme-rdma: serialize controller teardown sequences (bsc#1181161).\n- nvme-tcp: avoid race between time out and tear down (bsc#1181161).\n- nvme-tcp: avoid repeated request completion (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1181161).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: fix timeout handler (bsc#1181161).\n- nvme-tcp: serialize controller teardown sequences (bsc#1181161).\n- nvme: Restart request timers in resetting state (bsc#1181161).\n- nvme: add error log page slot definition (bsc#1181161).\n- nvme: include admin_q sync with nvme_sync_queues (bsc#1181161).\n- nvme: introduce \u0027Command Aborted By host\u0027 status code (bsc#1181161).\n- nvme: introduce nvme_is_fabrics to check fabrics cmd (bsc#1181161).\n- nvme: introduce nvme_sync_io_queues (bsc#1181161).\n- nvme: make fabrics command run on a separate request queue (bsc#1181161).\n- nvme: prevent warning triggered by nvme_stop_keep_alive (bsc#1181161).\n- nvme: unlink head after removing last namespace (bsc#1181161).\n- nvmet: add error log support for fabrics-cmd (bsc#1181161).\n- nvmet: add error-log definitions (bsc#1181161).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1912,SUSE-SLE-Module-Live-Patching-15-SP1-2021-1912,SUSE-SLE-Product-HA-15-SP1-2021-1912,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1912,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1912,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1912,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1912,SUSE-Storage-6-2021-1912",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1912-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1912-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211912-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1912-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-09T11:54:48Z",
"generator": {
"date": "2021-06-09T11:54:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1912-1",
"initial_release_date": "2021-06-09T11:54:48Z",
"revision_history": [
{
"date": "2021-06-09T11:54:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.92.1.noarch",
"product_id": "kernel-devel-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.92.1.noarch",
"product_id": "kernel-docs-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.92.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.92.1.noarch",
"product_id": "kernel-macros-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.92.1.noarch",
"product_id": "kernel-source-4.12.14-197.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.92.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.92.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.92.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.s390x",
"product_id": "kernel-syms-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.92.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.92.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0",
"product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0",
"product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0",
"product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.92.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x",
"SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-09T11:54:48Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2020-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-197_89 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2020,SUSE-SLE-Live-Patching-12-SP4-2021-2020,SUSE-SLE-Live-Patching-12-SP5-2021-2066,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2043",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2020-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2020-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212020-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2020-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2021-06-18T09:42:58Z",
"generator": {
"date": "2021-06-18T09:42:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2020-1",
"initial_release_date": "2021-06-18T09:42:58Z",
"revision_history": [
{
"date": "2021-06-18T09:42:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_74-default-2-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_71-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:58Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
}
]
}
suse-su-2021:1891-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1891,SUSE-OpenStack-Cloud-9-2021-1891,SUSE-OpenStack-Cloud-Crowbar-9-2021-1891,SUSE-SLE-HA-12-SP4-2021-1891,SUSE-SLE-Live-Patching-12-SP4-2021-1891,SUSE-SLE-SAP-12-SP4-2021-1891,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1891",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1891-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1891-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211891-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1891-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:09:12Z",
"generator": {
"date": "2021-06-08T13:09:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1891-1",
"initial_release_date": "2021-06-08T13:09:12Z",
"revision_history": [
{
"date": "2021-06-08T13:09:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.77.1.noarch",
"product_id": "kernel-devel-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.77.1.noarch",
"product_id": "kernel-docs-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.77.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.77.1.noarch",
"product_id": "kernel-macros-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.77.1.noarch",
"product_id": "kernel-source-4.12.14-95.77.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.77.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.77.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.77.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.77.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.s390x",
"product_id": "kernel-syms-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.77.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.77.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.77.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.77.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.77.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.77.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:09:12Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1975-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Documentation/ABI: sysfs-platform-ideapad-laptop: update device attribute paths (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- Hibernation: Fix Hibernate not blocked in Secure Boot with no EFI secret key \n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update config files. (bsc#1185010)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 (bsc#1152489) \n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489)\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kABI: repair after \u0027nVMX: Properly handle userspace interrupt window request\u0027 \n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). \n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes). \n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1975,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-1975",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1975-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1975-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211975-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1975-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html"
},
{
"category": "self",
"summary": "SUSE Bug 1043990",
"url": "https://bugzilla.suse.com/1043990"
},
{
"category": "self",
"summary": "SUSE Bug 1047233",
"url": "https://bugzilla.suse.com/1047233"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156256",
"url": "https://bugzilla.suse.com/1156256"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1159280",
"url": "https://bugzilla.suse.com/1159280"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177411",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "self",
"summary": "SUSE Bug 1177437",
"url": "https://bugzilla.suse.com/1177437"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178181",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179454",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "self",
"summary": "SUSE Bug 1179458",
"url": "https://bugzilla.suse.com/1179458"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1180980",
"url": "https://bugzilla.suse.com/1180980"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182591",
"url": "https://bugzilla.suse.com/1182591"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182713",
"url": "https://bugzilla.suse.com/1182713"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182716",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183048",
"url": "https://bugzilla.suse.com/1183048"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183077",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "self",
"summary": "SUSE Bug 1183095",
"url": "https://bugzilla.suse.com/1183095"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183203",
"url": "https://bugzilla.suse.com/1183203"
},
{
"category": "self",
"summary": "SUSE Bug 1183249",
"url": "https://bugzilla.suse.com/1183249"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183325",
"url": "https://bugzilla.suse.com/1183325"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183696",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183843",
"url": "https://bugzilla.suse.com/1183843"
},
{
"category": "self",
"summary": "SUSE Bug 1183859",
"url": "https://bugzilla.suse.com/1183859"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184176",
"url": "https://bugzilla.suse.com/1184176"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184509",
"url": "https://bugzilla.suse.com/1184509"
},
{
"category": "self",
"summary": "SUSE Bug 1184511",
"url": "https://bugzilla.suse.com/1184511"
},
{
"category": "self",
"summary": "SUSE Bug 1184512",
"url": "https://bugzilla.suse.com/1184512"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184583",
"url": "https://bugzilla.suse.com/1184583"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184760",
"url": "https://bugzilla.suse.com/1184760"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184893",
"url": "https://bugzilla.suse.com/1184893"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1184953",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184957",
"url": "https://bugzilla.suse.com/1184957"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185041",
"url": "https://bugzilla.suse.com/1185041"
},
{
"category": "self",
"summary": "SUSE Bug 1185110",
"url": "https://bugzilla.suse.com/1185110"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185365",
"url": "https://bugzilla.suse.com/1185365"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185454",
"url": "https://bugzilla.suse.com/1185454"
},
{
"category": "self",
"summary": "SUSE Bug 1185472",
"url": "https://bugzilla.suse.com/1185472"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185954",
"url": "https://bugzilla.suse.com/1185954"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186467",
"url": "https://bugzilla.suse.com/1186467"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-15T11:04:23Z",
"generator": {
"date": "2021-06-15T11:04:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1975-1",
"initial_release_date": "2021-06-15T11:04:23Z",
"revision_history": [
{
"date": "2021-06-15T11:04:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "low"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.3.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-15T11:04:23Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2208-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2208,SUSE-SLE-Module-RT-15-SP3-2021-2208,SUSE-SUSE-MicroOS-5.0-2021-2208",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2208-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2208-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212208-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2208-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-30T07:49:49Z",
"generator": {
"date": "2021-06-30T07:49:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2208-1",
"initial_release_date": "2021-06-30T07:49:49Z",
"revision_history": [
{
"date": "2021-06-30T07:49:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-8.13.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-8.13.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-8.13.1.noarch",
"product_id": "kernel-source-rt-5.3.18-8.13.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-8.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-8.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP3",
"product": {
"name": "SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-8.13.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-8.13.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-8.13.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-8.13.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-8.13.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-8.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-8.13.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-8.13.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-8.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-30T07:49:49Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1887-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1887,SUSE-SLE-SERVER-12-SP5-2021-1887",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1887-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1887-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211887-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1887-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183754",
"url": "https://bugzilla.suse.com/1183754"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184040",
"url": "https://bugzilla.suse.com/1184040"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184675",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:24Z",
"generator": {
"date": "2021-06-08T13:07:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1887-1",
"initial_release_date": "2021-06-08T13:07:24Z",
"revision_history": [
{
"date": "2021-06-08T13:07:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.59.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.59.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.59.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:24Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:1888-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: Update nvme repositories\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1888,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-1888",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1888-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1888-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211888-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1888-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:31Z",
"generator": {
"date": "2021-06-08T13:07:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1888-1",
"initial_release_date": "2021-06-08T13:07:31Z",
"revision_history": [
{
"date": "2021-06-08T13:07:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.50.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.50.2.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.50.2.noarch",
"product_id": "kernel-source-azure-5.3.18-18.50.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.50.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.50.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.50.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.50.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.50.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.50.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.50.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.50.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.50.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.50.2.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.50.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:31Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2060-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.180-94_124 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2060,SUSE-SLE-Module-Live-Patching-15-2021-2059,SUSE-SLE-Module-Live-Patching-15-2021-2060,SUSE-SLE-Module-Live-Patching-15-2021-2061,SUSE-SLE-Module-Live-Patching-15-2021-2062,SUSE-SLE-Module-Live-Patching-15-2021-2063,SUSE-SLE-Module-Live-Patching-15-2021-2064,SUSE-SLE-SAP-12-SP3-2021-2049,SUSE-SLE-SAP-12-SP3-2021-2053,SUSE-SLE-SAP-12-SP3-2021-2058,SUSE-SLE-SAP-12-SP3-2021-2065,SUSE-SLE-SERVER-12-SP3-2021-2049,SUSE-SLE-SERVER-12-SP3-2021-2053,SUSE-SLE-SERVER-12-SP3-2021-2058,SUSE-SLE-SERVER-12-SP3-2021-2065",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2060-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2060-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212060-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2060-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP3)",
"tracking": {
"current_release_date": "2021-06-18T09:45:47Z",
"generator": {
"date": "2021-06-18T09:45:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2060-1",
"initial_release_date": "2021-06-18T09:45:47Z",
"revision_history": [
{
"date": "2021-06-18T09:45:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"product_id": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:45:47Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_52-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-11-2.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_127-default-11-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_130-default-10-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_135-default-8-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:45:47Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
}
]
}
suse-su-2021:1899-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1899,SUSE-SLE-RT-12-SP5-2021-1899",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1899-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1899-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211899-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1899-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1101816",
"url": "https://bugzilla.suse.com/1101816"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1113431",
"url": "https://bugzilla.suse.com/1113431"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1174682",
"url": "https://bugzilla.suse.com/1174682"
},
{
"category": "self",
"summary": "SUSE Bug 1176081",
"url": "https://bugzilla.suse.com/1176081"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1180552",
"url": "https://bugzilla.suse.com/1180552"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1182256",
"url": "https://bugzilla.suse.com/1182256"
},
{
"category": "self",
"summary": "SUSE Bug 1183738",
"url": "https://bugzilla.suse.com/1183738"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185481",
"url": "https://bugzilla.suse.com/1185481"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185827",
"url": "https://bugzilla.suse.com/1185827"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1185906",
"url": "https://bugzilla.suse.com/1185906"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186452",
"url": "https://bugzilla.suse.com/1186452"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T17:29:39Z",
"generator": {
"date": "2021-06-08T17:29:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1899-1",
"initial_release_date": "2021-06-08T17:29:39Z",
"revision_history": [
{
"date": "2021-06-08T17:29:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.46.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.46.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.46.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.46.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.46.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.46.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T17:29:39Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2057-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150_72 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2057,SUSE-SLE-Module-Live-Patching-15-2021-2057",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2057-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2057-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212057-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2057-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15)",
"tracking": {
"current_release_date": "2021-06-18T09:44:40Z",
"generator": {
"date": "2021-06-18T09:44:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2057-1",
"initial_release_date": "2021-06-18T09:44:40Z",
"revision_history": [
{
"date": "2021-06-18T09:44:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:44:40Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:44:40Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:44:40Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:44:40Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
}
]
}
suse-su-2021:2067-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_61 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2067,SUSE-SLE-Live-Patching-12-SP5-2021-2067,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2028",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2067-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2067-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212067-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2067-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-06-18T09:40:57Z",
"generator": {
"date": "2021-06-18T09:40:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2067-1",
"initial_release_date": "2021-06-18T09:40:57Z",
"revision_history": [
{
"date": "2021-06-18T09:40:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_66-default-3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:40:57Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:40:57Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:40:57Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
}
]
}
suse-su-2021:2025-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-22 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2025,SUSE-SLE-Live-Patching-12-SP4-2021-2021,SUSE-SLE-Live-Patching-12-SP4-2021-2022,SUSE-SLE-Live-Patching-12-SP4-2021-2023,SUSE-SLE-Live-Patching-12-SP4-2021-2024,SUSE-SLE-Live-Patching-12-SP4-2021-2025,SUSE-SLE-Live-Patching-12-SP5-2021-2017,SUSE-SLE-Live-Patching-12-SP5-2021-2018,SUSE-SLE-Live-Patching-12-SP5-2021-2019,SUSE-SLE-Live-Patching-12-SP5-2021-2068,SUSE-SLE-Live-Patching-12-SP5-2021-2069,SUSE-SLE-Live-Patching-12-SP5-2021-2070,SUSE-SLE-Live-Patching-12-SP5-2021-2071,SUSE-SLE-Live-Patching-12-SP5-2021-2072,SUSE-SLE-Live-Patching-12-SP5-2021-2073,SUSE-SLE-Live-Patching-12-SP5-2021-2074,SUSE-SLE-Live-Patching-12-SP5-2021-2075,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2044,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2045,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2046,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2047,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2048,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2050,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2051,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2052,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2054,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2055,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2056,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2029,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2030,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2031,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2032,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2033,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2034,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2036,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2037,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2038,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2039,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2040,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2041",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2025-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2025-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212025-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2025-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-06-18T09:42:41Z",
"generator": {
"date": "2021-06-18T09:42:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2025-1",
"initial_release_date": "2021-06-18T09:42:41Z",
"revision_history": [
{
"date": "2021-06-18T09:42:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"product_id": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:41Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-13-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-12-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-11-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-9-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-12-5.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-10-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-8-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-7-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-6-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-5-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-11-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:41Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
}
]
}
suse-su-2021:1889-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1889,SUSE-SLE-Module-RT-15-SP2-2021-1889",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1889-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1889-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211889-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1889-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:07:48Z",
"generator": {
"date": "2021-06-08T13:07:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1889-1",
"initial_release_date": "2021-06-08T13:07:48Z",
"revision_history": [
{
"date": "2021-06-08T13:07:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-39.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-39.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-39.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-39.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-39.1.noarch",
"product_id": "kernel-source-rt-5.3.18-39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-39.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-39.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-39.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-39.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-39.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-39.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-39.1.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-39.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-39.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-39.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-39.1.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-39.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:07:48Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2451-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- hv_netvsc: Add handlers for ethtool get/set msg level (bsc#1175462).\n- hv_netvsc: avoid retry on send during shutdown (bsc#1175462).\n- hv_netvsc: avoid unnecessary wakeups on subchannel creation (bsc#1175462).\n- hv_netvsc: cancel subchannel setup before halting device (bsc#1175462).\n- hv_netvsc: change GPAD teardown order on older versions (bsc#1175462).\n- hv_netvsc: common detach logic (bsc#1175462).\n- hv_netvsc: delay setup of VF device (bsc#1175462).\n- hv_netvsc: disable NAPI before channel close (bsc#1175462).\n- hv_netvsc: Ensure correct teardown message sequence order (bsc#1175462).\n- hv_netvsc: Fix a deadlock by getting rtnl lock earlier in netvsc_probe() (bsc#1175462).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1175462).\n- hv_netvsc: fix deadlock on hotplug (bsc#1175462).\n- hv_netvsc: Fix error handling in netvsc_attach() (bsc#1175462).\n- hv_netvsc: fix error unwind handling if vmbus_open fails (bsc#1175462).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (bsc#1175462).\n- hv_netvsc: fix handling of fallback to single queue mode (bsc#1175462).\n- hv_netvsc: Fix hash key value reset after other ops (bsc#1175462).\n- hv_netvsc: Fix IP header checksum for coalesced packets (bsc#1175462).\n- hv_netvsc: Fix net device attach on older Windows hosts (bsc#1175462).\n- hv_netvsc: fix network namespace issues with VF support (bsc#1175462).\n- hv_netvsc: Fix NULL dereference at single queue mode fallback (bsc#1175462).\n- hv_netvsc: fix race during initialization (bsc#1175462).\n- hv_netvsc: fix race on sub channel creation (bsc#1175462).\n- hv_netvsc: fix race that may miss tx queue wakeup (bsc#1175462).\n- hv_netvsc: fix schedule in RCU context (bsc#1175462).\n- hv_netvsc: Fix the variable sizes in ipsecv2 and rsc offload (bsc#1175462).\n- hv_netvsc: Fix tx_table init in rndis_set_subchannel() (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup after tx_disable (bsc#1175462).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (bsc#1175462).\n- hv_netvsc: flag software created hash value (bsc#1175462).\n- hv_netvsc: netvsc_teardown_gpadl() split (bsc#1175462).\n- hv_netvsc: only wake transmit queue if link is up (bsc#1175462).\n- hv_netvsc: pass netvsc_device to rndis halt (bsc#1175462).\n- hv_netvsc: preserve hw_features on mtu/channels/ringparam changes (bsc#1175462).\n- hv_netvsc: Refactor assignments of struct netvsc_device_info (bsc#1175462).\n- hv_netvsc: set master device (bsc#1175462).\n- hv_netvsc: Set tx_table to equal weight after subchannels open (bsc#1175462).\n- hv_netvsc: Simplify num_chn checking in rndis_filter_device_add() (bsc#1175462).\n- hv_netvsc: Split netvsc_revoke_buf() and netvsc_teardown_gpadl() (bsc#1175462).\n- hv_netvsc: split sub-channel setup into async and sync (bsc#1175462).\n- hv_netvsc: typo in NDIS RSS parameters structure (bsc#1175462).\n- hv_netvsc: use RCU to fix concurrent rx and queue changes (bsc#1175462).\n- hv_netvsc: use reciprocal divide to speed up percent calculation (bsc#1175462).\n- hv_netvsc: Use Windows version instead of NVSP version on GPAD teardown (bsc#1175462).\n- kgraft: truncate the output from state_show() sysfs attr (bsc#1186235).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bsc#1115026).\n- mm: consider __HW_POISON pages when allocating from pcp lists (bsc#1187388).\n- scsi: storvsc: Enable scatterlist entry lengths \u003e 4Kbytes (bsc#1187193).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-2451,SUSE-2021-2451,SUSE-OpenStack-Cloud-8-2021-2451,SUSE-OpenStack-Cloud-Crowbar-8-2021-2451,SUSE-SLE-HA-12-SP3-2021-2451,SUSE-SLE-SAP-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-2021-2451,SUSE-SLE-SERVER-12-SP3-BCL-2021-2451",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2451-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2451-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212451-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2451-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1175462",
"url": "https://bugzilla.suse.com/1175462"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185724",
"url": "https://bugzilla.suse.com/1185724"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187193",
"url": "https://bugzilla.suse.com/1187193"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187388",
"url": "https://bugzilla.suse.com/1187388"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188063",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-22T11:16:06Z",
"generator": {
"date": "2021-07-22T11:16:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2451-1",
"initial_release_date": "2021-07-22T11:16:06Z",
"revision_history": [
{
"date": "2021-07-22T11:16:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.147.1.noarch",
"product_id": "kernel-devel-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.147.1.noarch",
"product_id": "kernel-macros-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.147.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.147.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.147.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.147.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.s390x",
"product_id": "kernel-syms-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.147.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.147.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.147.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.147.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.147.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.147.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.147.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.147.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.147.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.147.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.147.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.147.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.147.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_147-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-22T11:16:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
suse-su-2021:2577-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)\n- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)\n- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)\n- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)\n- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)\n- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)\n- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)\n- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2577,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2577-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2577-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2577-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1185847",
"url": "https://bugzilla.suse.com/1185847"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185901",
"url": "https://bugzilla.suse.com/1185901"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1187052",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "self",
"summary": "SUSE Bug 1188117",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "self",
"summary": "SUSE Bug 1188257",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)",
"tracking": {
"current_release_date": "2021-07-30T15:51:38Z",
"generator": {
"date": "2021-07-30T15:51:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2577-1",
"initial_release_date": "2021-07-30T15:51:38Z",
"revision_history": [
{
"date": "2021-07-30T15:51:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-30T15:51:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-3444"
}
]
}
suse-su-2021:1890-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-1890,SUSE-SLE-Module-Basesystem-15-SP2-2021-1890,SUSE-SLE-Module-Development-Tools-15-SP2-2021-1890,SUSE-SLE-Module-Legacy-15-SP2-2021-1890,SUSE-SLE-Module-Live-Patching-15-SP2-2021-1890,SUSE-SLE-Product-HA-15-SP2-2021-1890,SUSE-SLE-Product-WE-15-SP2-2021-1890,SUSE-SUSE-MicroOS-5.0-2021-1890",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1890-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:1890-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211890-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:1890-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-08T13:08:52Z",
"generator": {
"date": "2021-06-08T13:08:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:1890-1",
"initial_release_date": "2021-06-08T13:08:52Z",
"revision_history": [
{
"date": "2021-06-08T13:08:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.67.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.67.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.67.4.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.67.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.67.2.noarch",
"product_id": "kernel-devel-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.67.3.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.67.3.noarch",
"product_id": "kernel-docs-5.3.18-24.67.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.67.3.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.67.3.noarch",
"product_id": "kernel-docs-html-5.3.18-24.67.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.67.2.noarch",
"product_id": "kernel-macros-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-source-5.3.18-24.67.2.noarch",
"product_id": "kernel-source-5.3.18-24.67.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.67.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.67.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.67.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.67.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.67.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-devel-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-extra-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.s390x",
"product_id": "kernel-obs-build-5.3.18-24.67.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.s390x",
"product_id": "kernel-syms-5.3.18-24.67.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.67.3.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.67.3.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"product_id": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.67.3.9.30.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_67-preempt-1-5.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.67.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.67.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.67.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.67.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.67.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.67.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.67.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.67.4.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.67.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.67.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.67.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.67.3.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.67.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.67.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.67.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.67.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch"
},
"product_reference": "kernel-source-5.3.18-24.67.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.67.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.67.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.67.4.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.67.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.67.3.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.67.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_67-default-1-5.3.2.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.67.3.9.30.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.67.3.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.67.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.67.4.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.67.2.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.67.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.67.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.67.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-08T13:08:52Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
suse-su-2021:2042-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.180-94_138 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- Fixed a regression with the last livepatch which caused a kernel warning during sysfs read (bsc#1186235).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2042,SUSE-SLE-SAP-12-SP3-2021-2035,SUSE-SLE-SAP-12-SP3-2021-2042,SUSE-SLE-SERVER-12-SP3-2021-2035,SUSE-SLE-SERVER-12-SP3-2021-2042",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2042-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2042-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212042-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2042-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1186235",
"url": "https://bugzilla.suse.com/1186235"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)",
"tracking": {
"current_release_date": "2021-06-18T09:42:52Z",
"generator": {
"date": "2021-06-18T09:42:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2042-1",
"initial_release_date": "2021-06-18T09:42:52Z",
"revision_history": [
{
"date": "2021-06-18T09:42:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"product_id": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:52Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-6-2.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_141-default-5-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-18T09:42:52Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
}
]
}
suse-su-2021:2406-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)\n- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)\n- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)\n- CVE-2020-36385: Fixed a use-after-free flaw in ucma.c which allows for local privilege escalation. (bsc#1187050)\n- CVE-2021-0129: Fixed an improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access. (bsc#1186463)\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing. (bsc#1179610)\n- CVE-2020-36386: Fixed an out-of-bounds read in hci_extended_inquiry_result_evt. (bsc#1187038)\n- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets. (bsc#1185861)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2021-33034: Fixed an issue in net/bluetooth/hci_event.c where a use-after-free leads to writing an arbitrary value. (bsc#1186111)\n- CVE-2020-26139: Fixed a bug that allows an Access Point (AP) to forward EAPOL frames to other clients even though the sender has not yet successfully authenticated. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients. (bsc#1186062)\n- CVE-2021-23134: Fixed a use After Free vulnerability in nfc sockets which allows local attackers to elevate their privileges. (bsc#1186060)\n- CVE-2020-24586: Fixed a bug that, under the right circumstances, allows to inject arbitrary network packets and/or exfiltrate user data when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP. (bsc#1185859)\n- CVE-2020-26141: Fixed a flaw that could allows an adversary to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bsc#1185987)\n- CVE-2020-26145: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject arbitrary network packets. (bsc#1185860)\n- CVE-2020-24587: Fixed a bug that allows an adversary to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed. (bsc#1185862)\n- CVE-2020-26147: Fixed a bug in the WEP, WPA, WPA2, and WPA3 implementations that could allows an adversary to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames. (bsc#1185987)\n\nThe following non-security bugs were fixed:\n\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).\n- Update config files: disable CONFIG_CSD_LOCK_WAIT_DEBUG (bsc#1180846).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2406,SUSE-SLE-SERVER-12-SP2-BCL-2021-2406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2406-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2406-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179610",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186463",
"url": "https://bugzilla.suse.com/1186463"
},
{
"category": "self",
"summary": "SUSE Bug 1187038",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1187452",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "self",
"summary": "SUSE Bug 1187595",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "self",
"summary": "SUSE Bug 1187601",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "self",
"summary": "SUSE Bug 1187934",
"url": "https://bugzilla.suse.com/1187934"
},
{
"category": "self",
"summary": "SUSE Bug 1188062",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "self",
"summary": "SUSE Bug 1188116",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26558 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0129 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34693 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-20T12:40:03Z",
"generator": {
"date": "2021-07-20T12:40:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2406-1",
"initial_release_date": "2021-07-20T12:40:03Z",
"revision_history": [
{
"date": "2021-07-20T12:40:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.158.1.noarch",
"product_id": "kernel-devel-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.158.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.158.1.noarch",
"product_id": "kernel-macros-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-4.4.121-92.158.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.158.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.158.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.158.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.s390x",
"product_id": "kernel-syms-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.158.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.158.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.158.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.158.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.158.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.158.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.158.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.158.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.158.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-26558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26558"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26558",
"url": "https://www.suse.com/security/cve/CVE-2020-26558"
},
{
"category": "external",
"summary": "SUSE Bug 1179610 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1179610"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2020-26558",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-26558"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2020-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36386",
"url": "https://www.suse.com/security/cve/CVE-2020-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1187038 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1187038"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-36386",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2020-36386"
},
{
"cve": "CVE-2021-0129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0129"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0129",
"url": "https://www.suse.com/security/cve/CVE-2021-0129"
},
{
"category": "external",
"summary": "SUSE Bug 1186463 for CVE-2021-0129",
"url": "https://bugzilla.suse.com/1186463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-0129"
},
{
"cve": "CVE-2021-0512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0512"
}
],
"notes": [
{
"category": "general",
"text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0512",
"url": "https://www.suse.com/security/cve/CVE-2021-0512"
},
{
"category": "external",
"summary": "SUSE Bug 1187595 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187595"
},
{
"category": "external",
"summary": "SUSE Bug 1187597 for CVE-2021-0512",
"url": "https://bugzilla.suse.com/1187597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0512"
},
{
"cve": "CVE-2021-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0605"
}
],
"notes": [
{
"category": "general",
"text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0605",
"url": "https://www.suse.com/security/cve/CVE-2021-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1187601 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187601"
},
{
"category": "external",
"summary": "SUSE Bug 1187687 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1187687"
},
{
"category": "external",
"summary": "SUSE Bug 1188381 for CVE-2021-0605",
"url": "https://bugzilla.suse.com/1188381"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-0605"
},
{
"cve": "CVE-2021-22555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22555"
}
],
"notes": [
{
"category": "general",
"text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22555",
"url": "https://www.suse.com/security/cve/CVE-2021-22555"
},
{
"category": "external",
"summary": "SUSE Bug 1188116 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188116"
},
{
"category": "external",
"summary": "SUSE Bug 1188117 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188117"
},
{
"category": "external",
"summary": "SUSE Bug 1188411 for CVE-2021-22555",
"url": "https://bugzilla.suse.com/1188411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34693"
}
],
"notes": [
{
"category": "general",
"text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34693",
"url": "https://www.suse.com/security/cve/CVE-2021-34693"
},
{
"category": "external",
"summary": "SUSE Bug 1187452 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1187452"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2021-34693",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-34693"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.158.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.158.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.158.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-20T12:40:03Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
}
]
}
ghsa-xw4j-8m9c-4vwq
Vulnerability from github
net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
{
"affected": [],
"aliases": [
"CVE-2021-32399"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-05-10T22:15:00Z",
"severity": "HIGH"
},
"details": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"id": "GHSA-xw4j-8m9c-4vwq",
"modified": "2022-05-24T19:02:11Z",
"published": "2022-05-24T19:02:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32399"
},
{
"type": "WEB",
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"type": "WEB",
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210622-0006"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
opensuse-su-2021:1975-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Documentation/ABI: sysfs-platform-ideapad-laptop: update device attribute paths (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- Hibernation: Fix Hibernate not blocked in Secure Boot with no EFI secret key \n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update config files. (bsc#1185010)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 (bsc#1152489) \n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489)\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kABI: repair after \u0027nVMX: Properly handle userspace interrupt window request\u0027 \n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). \n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes). \n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-1975",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1975-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1975-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1975-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/"
},
{
"category": "self",
"summary": "SUSE Bug 1043990",
"url": "https://bugzilla.suse.com/1043990"
},
{
"category": "self",
"summary": "SUSE Bug 1047233",
"url": "https://bugzilla.suse.com/1047233"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156256",
"url": "https://bugzilla.suse.com/1156256"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1159280",
"url": "https://bugzilla.suse.com/1159280"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177411",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "self",
"summary": "SUSE Bug 1177437",
"url": "https://bugzilla.suse.com/1177437"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178181",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179454",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "self",
"summary": "SUSE Bug 1179458",
"url": "https://bugzilla.suse.com/1179458"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1180980",
"url": "https://bugzilla.suse.com/1180980"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181161",
"url": "https://bugzilla.suse.com/1181161"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182591",
"url": "https://bugzilla.suse.com/1182591"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182713",
"url": "https://bugzilla.suse.com/1182713"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182716",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183048",
"url": "https://bugzilla.suse.com/1183048"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183077",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "self",
"summary": "SUSE Bug 1183095",
"url": "https://bugzilla.suse.com/1183095"
},
{
"category": "self",
"summary": "SUSE Bug 1183120",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "self",
"summary": "SUSE Bug 1183203",
"url": "https://bugzilla.suse.com/1183203"
},
{
"category": "self",
"summary": "SUSE Bug 1183249",
"url": "https://bugzilla.suse.com/1183249"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183325",
"url": "https://bugzilla.suse.com/1183325"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183696",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183843",
"url": "https://bugzilla.suse.com/1183843"
},
{
"category": "self",
"summary": "SUSE Bug 1183859",
"url": "https://bugzilla.suse.com/1183859"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184176",
"url": "https://bugzilla.suse.com/1184176"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184509",
"url": "https://bugzilla.suse.com/1184509"
},
{
"category": "self",
"summary": "SUSE Bug 1184511",
"url": "https://bugzilla.suse.com/1184511"
},
{
"category": "self",
"summary": "SUSE Bug 1184512",
"url": "https://bugzilla.suse.com/1184512"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184583",
"url": "https://bugzilla.suse.com/1184583"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184760",
"url": "https://bugzilla.suse.com/1184760"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184893",
"url": "https://bugzilla.suse.com/1184893"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184952",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "self",
"summary": "SUSE Bug 1184953",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184957",
"url": "https://bugzilla.suse.com/1184957"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185041",
"url": "https://bugzilla.suse.com/1185041"
},
{
"category": "self",
"summary": "SUSE Bug 1185110",
"url": "https://bugzilla.suse.com/1185110"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185365",
"url": "https://bugzilla.suse.com/1185365"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185454",
"url": "https://bugzilla.suse.com/1185454"
},
{
"category": "self",
"summary": "SUSE Bug 1185472",
"url": "https://bugzilla.suse.com/1185472"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185860",
"url": "https://bugzilla.suse.com/1185860"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185862",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185954",
"url": "https://bugzilla.suse.com/1185954"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186060",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186062",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186451",
"url": "https://bugzilla.suse.com/1186451"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186467",
"url": "https://bugzilla.suse.com/1186467"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-11T13:00:28Z",
"generator": {
"date": "2021-07-11T13:00:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1975-1",
"initial_release_date": "2021-07-11T13:00:28Z",
"revision_history": [
{
"date": "2021-07-11T13:00:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.3.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.3.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:00:28Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:0843-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Revert \u0027arm64: vdso: Fix compilation with clang older than 8\u0027 (git-fixes).\n- Revert \u0027gdrom: fix a memory leak bug\u0027 (git-fixes).\n- Revert \u0027i3c master: fix missing destroy_workqueue() on error in i3c_master_register\u0027 (git-fixes).\n- Revert \u0027leds: lp5523: fix a missing check of return value of lp55xx_read\u0027 (git-fixes).\n- Revert 337f13046ff0 (\u0027futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op\u0027) (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-843",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0843-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0843-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0843-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184259",
"url": "https://bugzilla.suse.com/1184259"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185982",
"url": "https://bugzilla.suse.com/1185982"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186416",
"url": "https://bugzilla.suse.com/1186416"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-06-06T08:12:41Z",
"generator": {
"date": "2021-06-06T08:12:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0843-1",
"initial_release_date": "2021-06-06T08:12:41Z",
"revision_history": [
{
"date": "2021-06-06T08:12:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-devel-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-docs-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-docs-html-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-macros-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-source-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-source-5.3.18-lp152.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-debug-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-default-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product_id": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-preempt-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"product_id": "kernel-syms-5.3.18-lp152.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-source-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-lp152.78.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-lp152.78.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.78.1.lp152.8.34.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.78.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.78.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-06-06T08:12:41Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:1977-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).\n- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).\n- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read (bsc#1184170).\n- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).\n- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).\n- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).\n- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).\n- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).\n- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).\n- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).\n- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).\n- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).\n- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).\n- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).\n- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).\n- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).\n- CVE-2020-35519: Fixed an out-of-bounds memory access was found in x25_bind (bsc#1183696).\n- CVE-2020-27815: Fixed an issue in JFS filesystem where could have allowed an attacker to execute code (bsc#1179454).\n- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).\n- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).\n- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).\n- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).\n- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).\n- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).\n- CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver, triggered when an unexpected port ID number is encountered. (bnc#1184197).\n- CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation of the eBPF code verifier. This flaw allowed a local user to crash the system or possibly escalate their privileges. (bnc#1183077)\n- CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users could cause a denial of service (host OS hang) via a high rate of events to dom0 (bnc#1177411).\n- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).\n- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).\n- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bnc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bnc#1185641 bnc#1185796 ).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI / idle: override c-state latency when not in conformance with s0ix (bsc#1185840).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: PM: Add ACPI ID of Alder Lake Fan (git-fixes).\n- ACPI: PM: s2idle: Add AMD support to handle _DSM (bsc#1185840).\n- ACPI: PM: s2idle: Add missing LPS0 functions for AMD (bsc#1185840).\n- ACPI: PM: s2idle: Drop unused local variables and related code (bsc#1185840).\n- ACPI: PM: s2idle: Move x86-specific code to the x86 directory (bsc#1185840).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPI: processor: Fix CPU0 wakeup in acpi_idle_play_dead() (git-fixes).\n- ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m (git-fixes).\n- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).\n- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).\n- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).\n- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).\n- ALSA: Convert strlcpy to strscpy when return value is unused (git-fixes).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: dice: fix null pointer dereference when node is disconnected (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: firewire-lib: fix amdtp_packet tracepoints event for packet_index field (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/ca0132: Add Sound BlasterX AE-5 Plus support (git-fixes).\n- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).\n- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).\n- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).\n- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).\n- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).\n- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).\n- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).\n- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).\n- ALSA: hda/conexant: Add quirk for mute LED control on HP ZBook G5 (git-fixes).\n- ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/hdmi: Cancel pending works before suspend (bsc#1182377).\n- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).\n- ALSA: hda/hdmi: fix race in handling acomp ELD notification at resume (git-fixes).\n- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP OMEN laptop (git-fixes).\n- ALSA: hda/realtek: Add fixup for HP Spectre x360 15-df0xxx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).\n- ALSA: hda/realtek: Add quirk for Lenovo Ideapad S740 (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).\n- ALSA: hda/realtek: Chain in pop reduction fixup for ThinkStation P340 (git-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook 845 G8 (git-fixes).\n- ALSA: hda/realtek: Fix silent headphone output on ASUS UX430UA (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp on HP Envy AiO 32 (git-fixes).\n- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).\n- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).\n- ALSA: hda/realtek: call alc_update_headset_mode() in hp_automute_hook (git-fixes).\n- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).\n- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 15 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook Fury 17 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs and speaker for HP Zbook G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 440 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 640 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 840 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 850 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP 855 G8 (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for HP ProBook 445 G7 (git-fixes).\n- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda/realtek: the bass speaker can\u0027t output sound on Yoga 9i (git-fixes).\n- ALSA: hda: Add missing sanity checks in PM prepare/complete callbacks (git-fixes).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (bsc#1182377).\n- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).\n- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).\n- ALSA: hda: Flush pending unsolicited events before suspend (bsc#1182377).\n- ALSA: hda: Re-add dropped snd_poewr_change_state() calls (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: Fix the micmute led init state (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hda: ignore invalid NHLT table (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add DJM-450 to the quirks table (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).\n- ALSA: usb-audio: Add DJM750 to Pioneer mixer quirk (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJM-850 to quirks-table (git-fixes).\n- ALSA: usb-audio: Add dB range mapping for Sennheiser Communications Headset PC 8 (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb-audio: Add implicit feeback support for the BOSS GT-1 (git-fixes).\n- ALSA: usb-audio: Add support for Pioneer DJM-750 (git-fixes).\n- ALSA: usb-audio: Add support for many Roland devices\u0027 implicit feedback quirks (git-fixes).\n- ALSA: usb-audio: Apply implicit feedback mode for BOSS devices (git-fixes).\n- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).\n- ALSA: usb-audio: Carve out connector value checking into a helper (git-fixes).\n- ALSA: usb-audio: Check connector value on resume (git-fixes).\n- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).\n- ALSA: usb-audio: Convert remaining strlcpy() to strscpy() (git-fixes).\n- ALSA: usb-audio: Convert the last strlcpy() usage (git-fixes).\n- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).\n- ALSA: usb-audio: Declare Pioneer DJM-850 mixer controls (git-fixes).\n- ALSA: usb-audio: Drop implicit fb quirk entries dubbed for capture (git-fixes).\n- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).\n- ALSA: usb-audio: Fix \u0027RANGE setting not yet supported\u0027 errors (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).\n- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounce access in MIDI EP parser (git-fixes).\n- ALSA: usb-audio: Fix unintentional sign extension issue (git-fixes).\n- ALSA: usb-audio: Generic application of implicit fb to Roland/BOSS devices (git-fixes).\n- ALSA: usb-audio: Re-apply implicit feedback mode to Pioneer devices (git-fixes).\n- ALSA: usb-audio: Remove redundant assignment to len (git-fixes).\n- ALSA: usb-audio: Skip probe of UA-101 devices (git-fixes).\n- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: add mixer quirks for Pioneer DJM-900NXS2 (git-fixes).\n- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).\n- ALSA: usb-audio: fix Pioneer DJM-850 control label info (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).\n- ALSA: usb-audio: generate midi streaming substream names from jack names (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ALSA: usb-audio: use usb headers rather than define structs locally (git-fixes).\n- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).\n- ASoC: Intel: boards: sof-wm8804: add check for PLL setting (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).\n- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).\n- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for HP Spectre x360 convertible (git-fixes).\n- ASoC: Intel: sof_sdw: add quirk for new ADL-P Rvp (git-fixes).\n- ASoC: Intel: sof_sdw: reorganize quirks by generation (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).\n- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).\n- ASoC: SOF: Intel: unregister DMIC device on probe error (git-fixes).\n- ASoC: SOF: intel: fix wrong poll bits in dsp power down (git-fixes).\n- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).\n- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).\n- ASoC: ak5558: correct reset polarity (git-fixes).\n- ASoC: codecs: wcd934x: add a sanity check in set channel map (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).\n- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).\n- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).\n- ASoC: cs42l42: Fix channel width support (git-fixes).\n- ASoC: cs42l42: Fix mixer volume control (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).\n- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).\n- ASoC: max98373: Changed amp shutdown register as volatile (git-fixes).\n- ASoC: qcom: lpass-cpu: Fix lpass dai ids parse (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of bounds access (git-fixes).\n- ASoC: qcom: sdm845: Fix array out of range on rx slim channels (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: check all BUSIF status when error (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt1015: fix i2c communication error (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5659: Update MCLK rate in set_sysclk() (git-fixes).\n- ASoC: rt5670: Add a quirk for the Dell Venue 10 Pro 5055 (git-fixes).\n- ASoC: rt5670: Add emulated \u0027DAC1 Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027HP Playback Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove \u0027OUT Channel Switch\u0027 control (git-fixes).\n- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).\n- ASoC: rt711: add snd_soc_component remove callback (git-fixes).\n- ASoC: samsung: snow: remove useless test (git-fixes).\n- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).\n- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).\n- ASoC: simple-card-utils: Do not handle device clock (git-fixes).\n- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).\n- ASoC: soc-core kABI workaround (git-fixes).\n- ASoC: soc-core: Prevent warning if no DMI table is present (git-fixes).\n- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- ASoC: wm8960: Remove bitclk relax condition in wm8960_configure_sysclk (git-fixes).\n- Bluetooth: Fix incorrect status handling in LE PHY UPDATE event (git-fixes).\n- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: avoid deadlock between hci_dev-\u003elock and socket lock (git-fixes).\n- Bluetooth: btqca: Add valid le states quirk (git-fixes).\n- Bluetooth: btusb: Enable quirk boolean flag for Mediatek Chip (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Check for memory before fully initializing an instance (bsc#1183815).\n- EDAC/amd64: Get rid of the ECC disabled long message (bsc#1183815).\n- EDAC/amd64: Use cached data when checking for ECC (bsc#1183815).\n- Goodix Fingerprint device is not a modem (git-fixes).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: google: add don USB id (git-fixes).\n- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).\n- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).\n- IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS (jsc#SLE-13208).\n- IB/hfi1: Rework AIP and VNIC dummy netdev usage (jsc#SLE-13208).\n- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).\n- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: s6sy761 - fix coordinate read bit shift (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KEYS: trusted: Fix TPM reservation for seal/unseal (git-fixes).\n- KEYS: trusted: Fix memory leak on object td (git-fixes).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).\n- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).\n- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).\n- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).\n- KVM: kvmclock: Fix vCPUs \u003e 64 can\u0027t be online/hotpluged (bsc#1152489).\n- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).\n- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183323).\n- KVM: x86: Expose XSAVEERPTR to the guest (jsc#SLE-13573).\n- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183288).\n- KVM: x86: Set so called \u0027reserved CR3 bits in LM mask\u0027 at vCPU reset (bsc#1183324).\n- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).\n- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/AER: Add RCEC AER error injection support (bsc#1174426).\n- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).\n- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).\n- PCI/AER: Specify the type of Port that was reset (bsc#1174426).\n- PCI/AER: Use \u0027aer\u0027 variable for capability offset (bsc#1174426).\n- PCI/AER: Write AER Capability only when we control it (bsc#1174426).\n- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).\n- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).\n- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).\n- PCI/ERR: Bind RCEC devices to the Root Port driver (jsc#SLE-13736 jsc#SLE-14845).\n- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).\n- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).\n- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).\n- PCI/ERR: Clear status of the reporting device (bsc#1174426).\n- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).\n- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).\n- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).\n- PCI/ERR: Retain status from error notification (bsc#1174426).\n- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).\n- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).\n- PCI/ERR: Use \u0027bridge\u0027 for clarity in pcie_do_recovery() (bsc#1174426).\n- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (jsc#SLE-13736 jsc#SLE-14845 git-fixes).\n- PCI/portdrv: Report reset for frozen channel (bsc#1174426).\n- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: Fix pci_register_io_range() memory leak (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: designware-ep: Fix the Header Type check (git-fixes).\n- PCI: dwc: Move iATU detection earlier (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: keystone: Let AM65 use the pci_ops defined in pcie-designware-host.c (git-fixes).\n- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).\n- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).\n- PCI: tegra: Move \u0027dbi\u0027 accesses to post common DWC initialization (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).\n- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).\n- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).\n- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).\n- Platform: OLPC: Fix probe error handling (git-fixes).\n- RAS/CEC: Correct ce_add_elem()\u0027s returned values (bsc#1152489).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/cm: Fix IRQ restore in ib_send_cm_sidr_rep (jsc#SLE-15176).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/mlx5: Fix drop packet rule in egress table (jsc#SLE-15175).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/rtrs-clt: Close rtrs client conn before destroying rtrs clt session files (jsc#SLE-15176).\n- RDMA/rtrs-clt: destroy sysfs after removing session from active list (jsc#SLE-15176).\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- Re-enable yenta socket driver for x86_64 (bsc#1186349)\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).\n- USB: CDC-ACM: fix poison/unpoison imbalance (git-fixes).\n- USB: cdc-acm: downgrade message to debug (git-fixes).\n- USB: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).\n- USB: cdc-acm: fix double free on probe failure (git-fixes).\n- USB: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).\n- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).\n- USB: gadget: u_ether: Fix a configfs return code (git-fixes).\n- USB: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).\n- USB: replace hardcode maximum usb string length by definition (git-fixes).\n- USB: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ch341: add new Product ID (git-fixes).\n- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).\n- USB: serial: cp210x: add some more GE USB IDs (git-fixes).\n- USB: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).\n- USB: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).\n- USB: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: usblp: fix a hang in poll() if disconnected (git-fixes).\n- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)\n- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- apparmor: Fix aa_label refcnt leak in policy_update (git-fixes).\n- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).\n- appletalk: Fix skb allocation size in loopback case (git-fixes).\n- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath10k: Fix a use after free in ath10k_htc_send_bundle (git-fixes).\n- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).\n- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).\n- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).\n- atl1c: fix error return code in atl1c_probe() (git-fixes).\n- atl1e: fix error return code in atl1e_probe() (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: initialize \u0027struct batadv_tvlv_tt_vlan_data\u0027-\u003ereserved field (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: plug request for shared sbitmap (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blk-mq: set default elevator as deadline in case of hctx shared tagset (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- blkcg: fix memleak for iolatency (git-fixes).\n- block, bfq: set next_rq to waker_bfqq-\u003enext_rq in waker injection (bsc#1168838).\n- block: fix get_max_io_size() (git-fixes).\n- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).\n- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).\n- block: rsxx: select CONFIG_CRC32 (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: reverse order of TX disable and carrier off (git-fixes).\n- bpf, sockmap: Fix sk-\u003eprot unhash op reset (bsc#1155518).\n- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).\n- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).\n- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).\n- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).\n- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).\n- bpf: Enforce that struct_ops programs be GPL-only (bsc#1177028).\n- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).\n- bpf: Fix an unitialized value in bpf_iter (bsc#1177028).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- bpf: Fix propagation of 32 bit unsigned bounds from 64 bit bounds (bsc#1177028).\n- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).\n- bpf: Refcount task stack in bpf_get_task_stack (bsc#1177028).\n- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).\n- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).\n- bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET (bsc#1177028).\n- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).\n- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).\n- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).\n- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).\n- bsg: free the request before return error code (git-fixes).\n- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).\n- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).\n- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).\n- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).\n- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race between writes to swap files and scrub (bsc#1185586).\n- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).\n- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).\n- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).\n- bus: fsl-mc: add the dpdbg device type (bsc#1185670).\n- bus: fsl-mc: list more commands as accepted through the ioctl (bsc#1185670).\n- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).\n- bus: qcom: Put child node before return (git-fixes).\n- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).\n- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).\n- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).\n- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).\n- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).\n- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).\n- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).\n- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).\n- can: peak_usb: Revert \u0027can: peak_usb: add forgotten supported devices\u0027 (git-fixes).\n- can: peak_usb: add forgotten supported devices (git-fixes).\n- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).\n- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- ch_ktls: Fix kernel panic (jsc#SLE-15131).\n- ch_ktls: do not send snd_una update to TCB in middle (jsc#SLE-15131).\n- ch_ktls: fix device connection close (jsc#SLE-15131).\n- ch_ktls: fix enum-conversion warning (jsc#SLE-15129).\n- ch_ktls: tcb close causes tls connection failure (jsc#SLE-15131).\n- cifs: New optype for session operations (bsc#1181507).\n- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).\n- cifs: change noisy error message to FYI (bsc#1181507).\n- cifs: check pointer before freeing (bsc#1183534).\n- cifs: do not send close in compound create+close requests (bsc#1181507).\n- cifs: print MIDs in decimal notation (bsc#1181507).\n- cifs: return proper error code in statfs(2) (bsc#1181507).\n- cifs_debug: use %pd instead of messing with -\u003ed_name (bsc#1181507).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).\n- completion: Drop init_completion define (git-fixes).\n- configfs: fix a use-after-free in __configfs_open_file (git-fixes).\n- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).\n- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).\n- coresight: remove broken __exit annotations (git-fixes).\n- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).\n- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).\n- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).\n- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- cpuidle/pseries: Fixup CEDE0 latency only for POWER10 onwards (bsc#1185550 ltc#192610).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: arm/curve25519 - Move \u0027.fpu\u0027 after \u0027.arch\u0027 (git-fixes).\n- crypto: chelsio - Read rxchannel-id from firmware (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).\n- dm era: Fix bitset memory leaks (git-fixes).\n- dm era: Recover committed writeset after crash (git-fixes).\n- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).\n- dm era: Update in-core bitset after committing the metadata (git-fixes).\n- dm era: Use correct value size in equality function of writeset tree (git-fixes).\n- dm era: Verify the data block size hasn\u0027t changed (git-fixes).\n- dm era: only resize metadata in preresume (git-fixes).\n- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).\n- dm ioctl: fix error return code in target_message (git-fixes).\n- dm mpath: fix racey management of PG initialization (git-fixes).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).\n- dm raid: fix discard limits for raid1 (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (bsc#1185581).\n- dm writecache: fix the maximum number of arguments (git-fixes).\n- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).\n- dm writecache: remove BUG() and fail gracefully instead (git-fixes).\n- dm zoned: select CONFIG_CRC32 (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dm: eliminate potential source of excessive kernel log noise (git-fixes).\n- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).\n- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).\n- dmaengine: Fix a double free in dma_async_device_register (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback (git-fixes).\n- dmaengine: idxd: Fix potential null dereference on pointer status (git-fixes).\n- dmaengine: idxd: cleanup pci interrupt vector allocation management (git-fixes).\n- dmaengine: idxd: clear MSIX permission entry on shutdown (git-fixes).\n- dmaengine: idxd: fix cdev setup and free device lifetime issues (git-fixes).\n- dmaengine: idxd: fix delta_rec and crc size field for completion record (git-fixes).\n- dmaengine: idxd: fix dma device lifetime (git-fixes).\n- dmaengine: idxd: fix opcap sysfs attribute output (git-fixes).\n- dmaengine: idxd: fix wq cleanup of WQCFG registers (git-fixes).\n- dmaengine: idxd: fix wq size store permission state (git-fixes).\n- dmaengine: idxd: removal of pcim managed mmio mapping (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).\n- dpaa_eth: Use random MAC address when none is given (bsc#1184811).\n- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).\n- dpaa_eth: fix the RX headroom size alignment (git-fixes).\n- dpaa_eth: update the buffer layout for non-A050385 erratum scenarios (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).\n- drm/amd/display/dc/dce/dce_aux: Remove duplicate line causing \u0027field overwritten\u0027 issue (git-fixes).\n- drm/amd/display: Check for DSC support instead of ASIC revision (git-fixes).\n- drm/amd/display: Correct algorithm for reversed gamma (git-fixes).\n- drm/amd/display: DCHUB underflow counter increasing in some scenarios (git-fixes).\n- drm/amd/display: Do not optimize bandwidth before disabling planes (git-fixes).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix UBSAN: shift-out-of-bounds warning (git-fixes).\n- drm/amd/display: Fix debugfs link_settings entry (git-fixes).\n- drm/amd/display: Fix nested FPU context in dcn21_validate_bandwidth() (git-fixes).\n- drm/amd/display: Fix off by one in hdmi_14_process_transaction() (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).\n- drm/amd/display: Initialize attribute for hdcp_srm sysfs file (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: Revert dram_clock_change_latency for DCN2.1 (git-fixes).\n- drm/amd/display: Try YCbCr420 color when YCbCr444 fails (git-fixes).\n- drm/amd/display: add handling for hdcp2 rx id list validation (git-fixes).\n- drm/amd/display: changing sr exit latency (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amd/display: turn DPMS off on connector unplug (git-fixes).\n- drm/amd/pm: fix workload mismatch on vega10 (git-fixes).\n- drm/amd/powerplay: fix spelling mistake \u0027smu_state_memroy_block\u0027 -\u003e (bsc#1152489) Backporting notes: \t* rename amd/pm to amd/powerplay \t* context changes\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu/display/dm: add missing parameter documentation (git-fixes).\n- drm/amdgpu/display: buffer INTERRUPT_LOW_IRQ_CONTEXT interrupt work (git-fixes).\n- drm/amdgpu/display: remove redundant continue statement (git-fixes).\n- drm/amdgpu/display: restore AUX_DPHY_TX_CONTROL for DCN2.x (git-fixes).\n- drm/amdgpu/display: use GFP_ATOMIC in dcn21_validate_bandwidth_fp() (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work function (git-fixes).\n- drm/amdgpu/swsmu: add interrupt work handler for smu11 parts (git-fixes).\n- drm/amdgpu: Add additional Sienna Cichlid PCI ID (git-fixes).\n- drm/amdgpu: Add check to prevent IH overflow (git-fixes).\n- drm/amdgpu: Add mem sync flag for IB allocated by SA (git-fixes).\n- drm/amdgpu: Fix GPU TLB update error when PAGE_SIZE \u003e AMDGPU_PAGE_SIZE (git-fixes).\n- drm/amdgpu: Fix some unload driver issues (git-fixes).\n- drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode (git-fixes).\n- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fb BO should be ttm_bo_type_device (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: fix concurrent VM flushes on Vega/Navi v2 (git-fixes).\n- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).\n- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdgpu: remove unused variable from struct amdgpu_bo (git-fixes).\n- drm/amdgpu: update gc golden setting for Navi12 (git-fixes).\n- drm/amdgpu: update sdma golden setting for Navi12 (git-fixes).\n- drm/amdkfd: Fix UBSAN shift-out-of-bounds warning (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: \t* context changes\n- drm/amdkfd: dqm fence memory corruption (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: AST2500 fixups (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add 25MHz refclk support (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for 1152x864 mode (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Add support for AIP200 (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Disable screen on register init (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix P2A config detection (bsc#1174416).\n- drm/ast: Fix invalid usage of AST_MAX_HWC_WIDTH in cursor atomic_check (git-fixes).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).\n- drm/compat: Clear bounce structures (git-fixes).\n- drm/dp_mst: Revise broadcast msg lct \u0026 lcr (git-fixes).\n- drm/dp_mst: Set CLEAR_PAYLOAD_ID_TABLE as broadcast (git-fixes).\n- drm/hisilicon: Fix use-after-free (git-fixes).\n- drm/i915/display: fix compiler warning about array overrun (git-fixes).\n- drm/i915/gt: Clear CACHE_MODE prior to clearing residuals (git-fixes).\n- drm/i915/gt: Disable HiZ Raw Stall Optimization on broken gen7 (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang (git-fixes).\n- drm/i915/overlay: Fix active retire callback alignment (git-fixes).\n- drm/i915/selftests: Fix some error codes (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/i915: Fix ICL MG PHY vswing handling (git-fixes).\n- drm/i915: Fix crash in auto_retire (git-fixes).\n- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).\n- drm/i915: Hold onto an explicit ref to i915_vma_work.pinned (git-fixes).\n- drm/i915: Read C0DRB3/C1DRB3 as 16 bits again (git-fixes).\n- drm/i915: Wedge the GPU if command parser setup fails (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/ingenic: Fix non-OSD mode (git-fixes).\n- drm/ingenic: Register devm action to cleanup encoders (git-fixes).\n- drm/komeda: Fix bit check to import to value of proper type (git-fixes).\n- drm/lima: fix reference leak in lima_pm_busy (git-fixes).\n- drm/mcde/panel: Inverse misunderstood flag (git-fixes).\n- drm/mediatek: Fix aal size config (bsc#1152489) Backporting notes: \t* replaced mtk_ddp_write() with writel()\n- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).\n- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).\n- drm/msm/gem: Add obj-\u003elock wrappers (bsc#1152489) Backporting notes: \t* taken for 9b73bde39cf2 (\u0027drm/msm: Fix use-after-free in msm_gem with carveout\u0027) \t* context changes\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).\n- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Fix suspend/resume on i.MX5 (git-fixes).\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) Backporting notes: \t* context changes\n- drm/msm: Ratelimit invalid-fence message (git-fixes).\n- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).\n- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).\n- drm/nouveau/kms/nv50-: Get rid of bogus nouveau_conn_mode_valid() (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/panfrost: Clear MMU irqs before handling the fault (git-fixes).\n- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Do not try to map pages that are already mapped (git-fixes).\n- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: \t* context changes\n- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)\n- drm/probe-helper: Check epoch counter in output_poll_execute() (git-fixes).\n- drm/qxl: do not run release if qxl failed to init (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix AGP dependency (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- drm/shmem-helper: Check for purged buffers in fault handler (git-fixes).\n- drm/shmem-helper: Do not remove the offset in vm_area_struct pgoff (git-fixes).\n- drm/shmem-helpers: vunmap: Do not put pages for dma-buf (git-fixes).\n- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: \t* context changes\n- drm/tegra: Fix reference leak when pm_runtime_get_sync() fails (git-fixes).\n- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).\n- drm/tegra: dc: Restore coupling of display controllers (git-fixes).\n- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).\n- drm/tilcdc: send vblank event when disabling crtc (git-fixes).\n- drm/vc4: crtc: Reduce PV fifo threshold on hvs4 (git-fixes).\n- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: \t* context changes \t* change vc4_hdmi to vc4-\u003ehdmi \t* removed references to encoder-\u003ehdmi_monitor\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- drm: meson_drv add shutdown function (git-fixes).\n- drm: rcar-du: Fix PM reference leak in rcar_cmm_enable() (git-fixes).\n- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: \t* context changes\n- drm: rcar-du: Fix leak of CMM platform device reference (git-fixes).\n- drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).\n- enetc: Fix reporting of h/w packet counters (git-fixes).\n- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).\n- enetc: Workaround for MDIO register access issue (git-fixes).\n- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).\n- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).\n- ethernet: alx: fix order of calls on resume (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- ethtool: fix incorrect datatype in set_eee ops (bsc#1176447).\n- ethtool: fix missing NLM_F_MULTI flag when dumping (bsc#1176447).\n- ethtool: pause: make sure we init driver stats (jsc#SLE-15075).\n- exec: Move would_dump into flush_old_exec (git-fixes).\n- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).\n- ext4: find old entry again if failed to rename whiteout (bsc#1184742).\n- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).\n- ext4: fix potential htree index checksum corruption (bsc#1184728).\n- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).\n- extcon: Fix error handling in extcon_dev_register (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- fbmem: add margin check to fb_check_caps() (git-fixes).\n- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).\n- firmware: qcom_scm: Fix kernel-doc function names to match (git-fixes).\n- firmware: qcom_scm: Make __qcom_scm_is_call_available() return bool (git-fixes).\n- firmware: qcom_scm: Reduce locking section for __get_convention() (git-fixes).\n- firmware: qcom_scm: Workaround lack of \u0027is available\u0027 call on SC7180 (git-fixes).\n- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).\n- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).\n- fotg210-udc: Complete OUT requests on short packets (git-fixes).\n- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).\n- fotg210-udc: Fix DMA on EP0 for length \u003e max packet size (git-fixes).\n- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).\n- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).\n- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).\n- fs: direct-io: fix missing sdio-\u003eboundary (bsc#1184736).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).\n- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- ftrace/x86: Tell objtool to ignore nondeterministic ftrace stack layout (bsc#1177028).\n- ftrace: Fix modify_ftrace_direct (bsc#1177028).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix bad inode (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix live lock in fuse_iget() (bsc#1184211).\n- fuse: fix write deadlock (bsc#1185573).\n- fuse: verify write return (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- gcc-plugins: drop support for GCC \u0026lt;= 4.7 (bcs#1181862).\n- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).\n- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- geneve: do not modify the shared tunnel info when PMTU triggers an ICMP reply (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).\n- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).\n- gpio: omap: Save and restore sysconfig (git-fixes).\n- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).\n- gpio: sysfs: Obey valid_mask (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).\n- gpiolib: Do not free if pin ranges are not defined (git-fixes).\n- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- gpu/xen: Fix a use after free in xen_drm_drv_init (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hv_netvsc: Reset the RSC count if NVSP_STAT_FAIL in netvsc_receive() (git-fixes).\n- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: mlxbf: add IRQ check (git-fixes).\n- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).\n- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).\n- i2c: tegra: Add missing pm_runtime_put() (bsc#1184386).\n- i2c: tegra: Check errors for both positive and negative values (bsc#1184386).\n- i2c: tegra: Clean up and improve comments (bsc#1184386).\n- i2c: tegra: Clean up printk messages (bsc#1184386).\n- i2c: tegra: Clean up probe function (bsc#1184386).\n- i2c: tegra: Clean up variable names (bsc#1184386).\n- i2c: tegra: Clean up variable types (bsc#1184386).\n- i2c: tegra: Clean up whitespaces, newlines and indentation (bsc#1184386).\n- i2c: tegra: Create i2c_writesl_vi() to use with VI I2C for filling TX FIFO (bsc#1184386).\n- i2c: tegra: Factor out error recovery from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out hardware initialization into separate function (bsc#1184386).\n- i2c: tegra: Factor out packet header setup from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Factor out register polling into separate function (bsc#1184386).\n- i2c: tegra: Handle potential error of tegra_i2c_flush_fifos() (bsc#1184386).\n- i2c: tegra: Improve driver module description (bsc#1184386).\n- i2c: tegra: Improve formatting of variables (bsc#1184386).\n- i2c: tegra: Initialize div-clk rate unconditionally (bsc#1184386).\n- i2c: tegra: Make tegra_i2c_flush_fifos() usable in atomic transfer (bsc#1184386).\n- i2c: tegra: Mask interrupt in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Move out all device-tree parsing into tegra_i2c_parse_dt() (bsc#1184386).\n- i2c: tegra: Remove \u0027dma\u0027 variable from tegra_i2c_xfer_msg() (bsc#1184386).\n- i2c: tegra: Remove error message used for devm_request_irq() failure (bsc#1184386).\n- i2c: tegra: Remove i2c_dev.clk_divisor_non_hs_mode member (bsc#1184386).\n- i2c: tegra: Remove likely/unlikely from the code (bsc#1184386).\n- i2c: tegra: Remove outdated barrier() (bsc#1184386).\n- i2c: tegra: Remove redundant check in tegra_i2c_issue_bus_clear() (bsc#1184386).\n- i2c: tegra: Rename wait/poll functions (bsc#1184386).\n- i2c: tegra: Reorder location of functions in the code (bsc#1184386).\n- i2c: tegra: Runtime PM always available on Tegra (bsc#1184386).\n- i2c: tegra: Use clk-bulk helpers (bsc#1184386).\n- i2c: tegra: Use devm_platform_get_and_ioremap_resource() (bsc#1184386).\n- i2c: tegra: Use platform_get_irq() (bsc#1184386).\n- i2c: tegra: Use reset_control_reset() (bsc#1184386).\n- i2c: tegra: Use threaded interrupt (bsc#1184386).\n- i2c: tegra: Wait for config load atomically while in ISR (bsc#1184386).\n- i40e: Add zero-initialization of AQ command structures (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix add TC filter for IPv6 (git-fixes).\n- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).\n- i40e: Fix display statistics for veb_tc (git-fixes).\n- i40e: Fix endianness conversions (git-fixes).\n- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).\n- i40e: Fix kernel oops when i40e driver removes VF\u0027s (git-fixes).\n- i40e: Fix overwriting flow control settings during driver loading (git-fixes).\n- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).\n- i40e: Fix sparse error: \u0027vsi-\u003enetdev\u0027 could be null (jsc#SLE-8025).\n- i40e: Fix sparse error: uninitialized symbol \u0027ring\u0027 (jsc#SLE-13701).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix sparse warning: missing error code \u0027err\u0027 (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- i915/perf: Start hrtimer only if sampling the OA buffer (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- iavf: use generic power management (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).\n- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).\n- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).\n- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).\n- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).\n- ibmvnic: fix block comments (bsc#1183871 ltc#192139).\n- ibmvnic: fix braces (bsc#1183871 ltc#192139).\n- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).\n- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).\n- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).\n- ibmvnic: prefer \u0027unsigned long\u0027 over \u0027unsigned long int\u0027 (bsc#1183871 ltc#192139).\n- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).\n- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).\n- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).\n- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).\n- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).\n- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Account for port VLAN in VF max packet size calculation (git-fixes).\n- ice: Cleanup fltr list in case of allocation issues (git-fixes).\n- ice: Continue probe on link/PHY errors (jsc#SLE-12878).\n- ice: Fix for dereference of NULL pointer (git-fixes).\n- ice: Increase control queue timeout (git-fixes).\n- ice: Use port number instead of PF ID for WoL (jsc#SLE-12878).\n- ice: fix memory allocation call (jsc#SLE-12878).\n- ice: fix memory leak if register_netdev_fails (git-fixes).\n- ice: fix memory leak in ice_vsi_setup (git-fixes).\n- ice: fix memory leak of aRFS after resuming from suspend (jsc#SLE-12878).\n- ice: prevent ice_open and ice_stop during reset (git-fixes).\n- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: XDP extack message on error (jsc#SLE-13536).\n- igb: XDP xmit back fix error code (jsc#SLE-13536).\n- igb: avoid premature Rx buffer reuse (jsc#SLE-13536).\n- igb: avoid transmit queue timeout in xdp path (jsc#SLE-13536).\n- igb: check timestamp validity (git-fixes).\n- igb: skb add metasize for xdp (jsc#SLE-13536).\n- igb: take VLAN double header into account (jsc#SLE-13536).\n- igb: use xdp_do_flush (jsc#SLE-13536).\n- igc: Fix Pause Frame Advertising (git-fixes).\n- igc: Fix Supported Pause Frame Link Setting (git-fixes).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- igc: reinit_locked() should be called with rtnl_lock (git-fixes).\n- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).\n- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).\n- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).\n- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).\n- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).\n- ima: Free IMA measurement buffer after kexec syscall (git-fixes).\n- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- intel_th: pci: Add Alder Lake-M support (git-fixes).\n- intel_th: pci: Add Rocket Lake CPU support (git-fixes).\n- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).\n- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183310).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).\n- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183312).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183313).\n- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).\n- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).\n- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183315).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).\n- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183316).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).\n- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183317).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).\n- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183318).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).\n- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183319).\n- iommu/vt-d: Fix status code for Allocate/Free PASID command (bsc#1183320).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).\n- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183321).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).\n- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183322).\n- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).\n- iommu: Check dev-\u003eiommu in dev_iommu_priv_get() before dereferencing it (bsc#1183311).\n- iommu: Switch gather-\u003eend to the inclusive end (bsc#1183314).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- ionic: linearize tso skb with too many frags (bsc#1167773).\n- iopoll: introduce read_poll_timeout macro (git-fixes).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1184264).\n- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1184264).\n- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).\n- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).\n- isofs: release buffer head before return (bsc#1182613).\n- iwlwifi: add support for Qu with AX201 device (git-fixes).\n- iwlwifi: pcie: make cfg vs. trans_cfg more robust (git-fixes).\n- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).\n- ixgbe: fix unbalanced device enable/disable in suspend/resume (jsc#SLE-13706).\n- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).\n- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).\n- kABI: cover up change in struct kvm_arch (bsc#1184969).\n- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- kbuild: Fail if gold linker is detected (bcs#1181862).\n- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).\n- kbuild: change *FLAGS_\u0026lt;basetarget\u003e.o to take the path relative to $(obj) (bcs#1181862).\n- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).\n- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).\n- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).\n- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).\n- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).\n- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).\n- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).\n- kconfig: introduce m32-flag and m64-flag (bcs#1181862).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kvm: svm: Update svm_xsaves_supported (jsc#SLE-13573).\n- kvm: x86: Enumerate support for CLZERO instruction (jsc#SLE-13573).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).\n- libbpf: Add explicit padding to bpf_xdp_set_link_opts (bsc#1177028).\n- libbpf: Add explicit padding to btf_dump_emit_type_decl_opts (bsc#1177028).\n- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).\n- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).\n- libbpf: Fix INSTALL flag order (bsc#1155518).\n- libbpf: Fix bail out from \u0027ringbuf_process_ring()\u0027 on error (bsc#1177028).\n- libbpf: Fix error path in bpf_object__elf_init() (bsc#1177028).\n- libbpf: Fix signed overflow in ringbuf_process_ring (bsc#1177028).\n- libbpf: Initialize the bpf_seq_printf parameters array field by field (bsc#1177028).\n- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).\n- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).\n- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).\n- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).\n- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).\n- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).\n- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mISDN: fix crash in fritzpci (git-fixes).\n- mac80211: Allow HE operation to be longer than expected (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: choose first enabled channel for monitor (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- mac80211: fix TXQ AC confusion (git-fixes).\n- mac80211: fix double free in ibss_leave (git-fixes).\n- mac80211: fix rate mask reset (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- mdio: fix mdio-thunder.c dependency \u0026 build error (git-fixes).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).\n- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: mantis: remove orphan mantis_core.c (git-fixes).\n- media: mceusb: sanity check for prescaler value (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).\n- media: rc: compile rc-cec.c into rc-core (git-fixes).\n- media: saa7134: use sg_dma_len when building pgtable (git-fixes).\n- media: saa7146: use sg_dma_len when building pgtable (git-fixes).\n- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).\n- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- media: usbtv: Fix deadlock on suspend (git-fixes).\n- media: uvcvideo: Allow entities with no pads (git-fixes).\n- media: v4l2-ctrls.c: fix race condition in hdl-\u003erequests list (git-fixes).\n- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).\n- media: v4l: vsp1: Fix bru null pointer access (git-fixes).\n- media: v4l: vsp1: Fix uif null pointer access (git-fixes).\n- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).\n- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).\n- memory: mtk-smi: Fix PM usage counter unbalance in mtk_smi ops (bsc#1183325).\n- memory: pl353: fix mask of ECC page_size config register (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- mfd: intel_pmt: Fix nuisance messages and handling of disabled capabilities (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/pvpanic: Export module FDT device table (git-fixes).\n- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).\n- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).\n- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).\n- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Fix partition switch time for eMMC (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: cqhci: Add cqhci_deactivate() (git-fixes).\n- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mmc: mxs-mmc: Fix a resource leak in an error handling path in \u0027mxs_mmc_probe()\u0027 (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (bsc#1186009)\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (bsc#1186009)\n- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).\n- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).\n- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).\n- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).\n- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).\n- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).\n- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).\n- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).\n- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mt76: dma: do not report truncated frames to mac80211 (git-fixes).\n- mt76: mt7615: fix entering driver-own state on mt7663 (git-fixes).\n- mt76: mt7615: support loading EEPROM for MT7613BE (git-fixes).\n- mt76: mt76x0: disable GTK offloading (git-fixes).\n- mt76: mt7915: fix aggr len debugfs node (git-fixes).\n- mt76: mt7915: fix txpower init for TSSI off chips (git-fixes).\n- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).\n- mtd: rawnand: atmel: Update ecc_stats.corrected counter (git-fixes).\n- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).\n- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).\n- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).\n- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- mtd: spi-nor: Rename \u0027n25q512a\u0027 to \u0027mt25qu512a (n25q512a)\u0027 (bsc#1167260).\n- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).\n- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).\n- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).\n- nbd: fix a block_device refcount leak in nbd_release (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5: Add back multicast stats for uplink representor (jsc#SLE-15172).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5: Do not request more than supported EQs (git-fixes).\n- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).\n- net/mlx5: Fix bit-wise and with zero (jsc#SLE-15172).\n- net/mlx5: Fix health error state handling (bsc#1186467).\n- net/mlx5e: Allow to match on MPLS parameters only for MPLS over UDP (jsc#SLE-15172).\n- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).\n- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Fix ethtool indication of connector type (git-fixes).\n- net/mlx5e: Fix setting of RS FEC mode (jsc#SLE-15172).\n- net/mlx5e: Offload tuple rewrite for non-CT flows (jsc#SLE-15172).\n- net/mlx5e: RX, Mind the MPWQE gaps when calculating offsets (jsc#SLE-15172).\n- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net/sched: act_ct: fix wild memory access when clearing fragments (bsc#1176447).\n- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).\n- net: atheros: switch from \u0027pci_\u0027 to \u0027dma_\u0027 API (git-fixes).\n- net: atlantic: fix out of range usage of active_vlans array (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: b44: fix error return code in b44_init_one() (git-fixes).\n- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).\n- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).\n- net: cls_api: Fix uninitialised struct field bo-\u003eunlocked_driver_cb (bsc#1176447).\n- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).\n- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).\n- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).\n- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).\n- net: enetc: allow hardware timestamping on TX queues with tc-etf enabled (git-fixes).\n- net: enetc: do not disable VLAN filtering in IFF_PROMISC mode (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).\n- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).\n- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).\n- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).\n- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).\n- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).\n- net: fec: Fix reference count leak in fec series ops (git-fixes).\n- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).\n- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).\n- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).\n- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).\n- net: gianfar: Add of_node_put() before goto statement (git-fixes).\n- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).\n- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: Remove the left over redundant check \u0026 assignment (bsc#1154353).\n- net: hns3: Remove un-necessary \u0027else-if\u0027 in the hclge_reset_event() (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear VF down state bit before request link status (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix bug when calculating the TCAM table info (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: fix query vlan mask value error for flow director (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).\n- net: korina: fix kfree of rx/tx descriptor array (git-fixes).\n- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).\n- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).\n- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).\n- net: ll_temac: Fix race condition causing TX hang (git-fixes).\n- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).\n- net: mvneta: fix double free of txq-\u003ebuf (git-fixes).\n- net: mvneta: make tx buffer array agnostic (git-fixes).\n- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).\n- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).\n- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).\n- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).\n- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).\n- net: stmmac: removed enabling eee in EEE set callback (git-fixes).\n- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).\n- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).\n- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).\n- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).\n- net: wan/lmc: unregister device when no matching device is found (git-fixes).\n- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netdevsim: init u64 stats for 32bit hardware (git-fixes).\n- netfilter: conntrack: Make global sysctls readonly in non-init netns (bsc#1176447).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: flowtable: Make sure GC works periodically in idle system (bsc#1176447).\n- netfilter: flowtable: fix NAT IPv6 offload mangling (bsc#1176447).\n- netfilter: nftables: allow to update flowtable flags (bsc#1176447).\n- netfilter: nftables: report EOPNOTSUPP on unsupported flowtable flags (bsc#1176447).\n- netsec: restore phy power state after controller reset (bsc#1183757).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nfp: devlink: initialize the devlink port attribute \u0027lanes\u0027 (bsc#1176447).\n- nfp: flower: add ipv6 bit to pre_tunnel control message (bsc#1176447).\n- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).\n- nfp: flower: ignore duplicate merge hints from FW (git-fixes).\n- node: fix device cleanups in error handling code (git-fixes).\n- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fabrics: fix kato initialization (bsc#1182591).\n- nvme-fabrics: only reserve a single tag (bsc#1182077).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: fix racing controller reset and create association (bsc#1183048).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1180197).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1180197).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-hwmon: Return error code when registration fails (bsc#1177326).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999). \n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1180197).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).\n- nvme: call nvme_identify_ns as the first thing in nvme_alloc_ns_block (bsc#1180197).\n- nvme: clean up the check for too large logic block sizes (bsc#1180197).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: factor out a nvme_configure_metadata helper (bsc#1180197).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix initialization of the zone bitmaps (bsc#1180197).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: freeze the queue over -\u003elba_shift updates (bsc#1180197).\n- nvme: lift the check for an unallocated namespace into nvme_identify_ns (bsc#1180197).\n- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).\n- nvme: move nvme_validate_ns (bsc#1180197).\n- nvme: opencode revalidate_disk in nvme_validate_ns (bsc#1180197).\n- nvme: query namespace identifiers before adding the namespace (bsc#1180197).\n- nvme: refactor nvme_validate_ns (bsc#1180197).\n- nvme: remove nvme_identify_ns_list (bsc#1180197).\n- nvme: remove nvme_update_formats (bsc#1180197).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: remove the 0 lba_shift check in nvme_update_ns_info (bsc#1180197).\n- nvme: remove the disk argument to nvme_update_zone_info (bsc#1180197).\n- nvme: rename __nvme_revalidate_disk (bsc#1180197).\n- nvme: rename _nvme_revalidate_disk (bsc#1180197).\n- nvme: rename nvme_validate_ns to nvme_validate_or_alloc_ns (bsc#1180197).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).\n- nvme: revalidate zone bitmaps in nvme_update_ns_info (bsc#1180197).\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: set the queue limits in nvme_update_ns_info (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1180197).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvme: update the known admin effects (bsc#1180197).\n- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- ocfs2: fix a use after free on error (bsc#1184738).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).\n- ovl: fix out of date comment and unreachable code (bsc#1184176).\n- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).\n- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).\n- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).\n- ovl: initialize error in ovl_copy_xattr (bsc#1184176).\n- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- perf/amd/uncore: Fix sysfs type mismatch (bsc#1178134).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- partitions/ibm: fix non-DASD devices (bsc#1185857 LTC#192526).\n- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: qcom: spmi-gpio: fix warning about irq chip reusage (git-fixes).\n- pinctrl: rockchip: fix restore error in resume (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).\n- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).\n- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).\n- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).\n- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).\n- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).\n- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).\n- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).\n- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: intel_pmt_crashlog: Fix incorrect macros (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).\n- powerpc/64s/exception: Clean up a missed SRR specifier (jsc#SLE-9246 git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).\n- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).\n- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).\n- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).\n- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).\n- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).\n- powerpc/kexec_file: Use current CPU info while setting up FDT (bsc#1184615 ltc#189835).\n- powerpc/kuap: Restore AMR after replaying soft interrupts (bsc#1156395).\n- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).\n- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).\n- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).\n- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).\n- powerpc/perf: Fix sampled instruction type for larx/stcx (jsc#SLE-13513).\n- powerpc/perf: Fix the threshold event selection for memory events in power10 (jsc#SLE-13513).\n- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).\n- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).\n- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).\n- powerpc/pseries/ras: Remove unused variable \u0027status\u0027 (bsc#1065729).\n- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).\n- powerpc/pseries: Do not trace hcall tracing wrapper (bsc#1185110 ltc#192091).\n- powerpc/pseries: Fix hcall tracing recursion in pv queued spinlocks (bsc#1185110 ltc#192091).\n- powerpc/pseries: use notrace hcall variant for H_CEDE idle (bsc#1185110 ltc#192091).\n- powerpc/pseries: warn if recursing into the hcall tracing code (bsc#1185110 ltc#192091).\n- powerpc/smp: Reintroduce cpu_core_mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).\n- powerpc/sstep: Fix darn emulation (bsc#1156395).\n- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).\n- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).\n- powerpc/time: Enable sched clock for irqtime (bsc#1156395).\n- powerpc/uaccess: Avoid might_fault() when user access is enabled (bsc#1156395).\n- powerpc/uaccess: Perform barrier_nospec() in KUAP allowance helpers (bsc#1156395).\n- powerpc/uaccess: Simplify unsafe_put_user() implementation (bsc#1156395).\n- powerpc/xive: Drop check on irq_data in xive_core_debug_show() (bsc#1177437 ltc#188522 jsc#SLE-13294 git-fixes).\n- powerpc/xmon: Fix build failure for 8xx (jsc#SLE-12936 git-fixes).\n- powerpc: Fix inverted SET_FULL_REGS bitop (jsc#SLE-9246 git-fixes).\n- powerpc: Fix missing declaration ofable_kernel_vsx() (git-fixes).\n- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).\n- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- qxl: Fix uninitialised struct field head.surface_id (git-fixes).\n- r8169: do not advertise pause in jumbo mode (git-fixes).\n- r8169: fix DMA being used after buffer free if WoL is enabled (git-fixes).\n- r8169: tweak max read request size for newer chips also in jumbo mtu mode (git-fixes).\n- regmap: set debugfs_name to NULL after it is freed (git-fixes).\n- regulator: Avoid a double \u0027of_node_get\u0027 in \u0027regulator_of_get_init_node()\u0027 (git-fixes).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- reintroduce cqhci_suspend for kABI (git-fixes).\n- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).\n- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).\n- rsi: Move card interrupt handling to RX thread (git-fixes).\n- rsi: Use resume_noirq for SDIO (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).\n- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).\n- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).\n- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).\n- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).\n- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).\n- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).\n- rtc: pcf2127: add alarm support (bsc#1185233).\n- rtc: pcf2127: add pca2129 device id (bsc#1185233).\n- rtc: pcf2127: add tamper detection support (bsc#1185233).\n- rtc: pcf2127: add watchdog feature support (bsc#1185233).\n- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).\n- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).\n- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).\n- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).\n- rtc: pcf2127: fix alarm handling (bsc#1185233).\n- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).\n- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- rtc: pcf2127: let the core handle rtc range (bsc#1185233).\n- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).\n- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).\n- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).\n- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).\n- rtc: pcf2127: set regmap max_register (bsc#1185233).\n- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- rtw88: Fix an error code in rtw_debugfs_set_rsvd_page() (git-fixes).\n- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).\n- rtw88: coex: 8821c: correct antenna switch function (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/ipl: support NVMe IPL kernel parameters (bsc#1185980 LTC#192679).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- s390/pci: fix leak of PCI device structure (git-fixes).\n- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).\n- s390/qeth: fix notification for pending buffers during teardown (git-fixes).\n- s390/qeth: improve completion of pending TX buffers (git-fixes).\n- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).\n- s390/vtime: fix increased steal time accounting (bsc#1183859).\n- s390/zcrypt: return EIO when msg retry limit reached (git-fixes).\n- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).\n- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).\n- sata_mv: add IRQ checks (git-fixes).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix shift-out-of-bounds in load_balance() (git fixes (sched)).\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: aacraid: Improve compat_ioctl handlers (bsc#1186352).\n- scsi: block: Fix a race in the runtime power management code (git-fixes).\n- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: core: add scsi_host_busy_iter() (bsc#1179851).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: fnic: Remove bogus ratelimit messages (bsc#1183249).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).\n- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).\n- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).\n- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).\n- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).\n- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).\n- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).\n- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).\n- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).\n- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).\n- scsi: lpfc: Fix a typo (bsc#1185472).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).\n- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).\n- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).\n- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).\n- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).\n- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).\n- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).\n- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).\n- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).\n- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).\n- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).\n- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).\n- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).\n- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).\n- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).\n- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).\n- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).\n- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).\n- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).\n- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).\n- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).\n- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).\n- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).\n- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).\n- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).\n- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).\n- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).\n- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).\n- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).\n- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).\n- scsi: mpt3sas: Only one vSES is present even when IOC has multi vSES (bsc#1185954).\n- scsi: pm80xx: Do not sleep in atomic context (bsc#1186353).\n- scsi: pm80xx: Fix chip initialization failure (bsc#1186354).\n- scsi: pm80xx: Fix potential infinite loop (bsc#1186354).\n- scsi: pm80xx: Increase timeout for pm80xx mpi_uninit_check() (bsc#1186355).\n- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).\n- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).\n- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).\n- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).\n- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).\n- scsi: qla2xxx: Consolidate zio threshold setting for both FCP \u0026 NVMe (bsc#1185491).\n- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).\n- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).\n- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).\n- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).\n- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).\n- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).\n- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).\n- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).\n- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).\n- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).\n- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).\n- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).\n- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).\n- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).\n- scsi: qla2xxx: Fix stuck session (bsc#1185491).\n- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).\n- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).\n- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).\n- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).\n- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).\n- scsi: qla2xxx: Replace __qla2x00_marker()\u0027s missing underscores (bsc#1185491).\n- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).\n- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).\n- scsi: qla2xxx: Simplify if statement (bsc#1185491).\n- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).\n- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).\n- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).\n- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).\n- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).\n- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).\n- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).\n- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).\n- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).\n- scsi: target: tcmu: Fix use-after-free of se_cmd-\u003epriv (bsc#1186356).\n- scsi: target: tcmu: Fix warning: \u0027page\u0027 may be used uninitialized (bsc#1186357).\n- sctp: delay auto_asconf init until binding the first addr (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- security: keys: trusted: fix TPM2 authorizations (git-fixes).\n- selftests/bpf: Fix BPF_CORE_READ_BITFIELD() macro (bsc#1177028).\n- selftests/bpf: Fix the ASSERT_ERR_PTR macro (bsc#1177028).\n- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).\n- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).\n- selftests/bpf: Re-generate vmlinux.h and BPF skeletons if bpftool changed (bsc#1177028).\n- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).\n- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).\n- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).\n- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).\n- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).\n- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).\n- selftests: mlxsw: Remove a redundant if statement in tc_flower_scale test (bsc#1176774).\n- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).\n- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).\n- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).\n- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).\n- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).\n- soc: aspeed: fix a ternary sign expansion bug (git-fixes).\n- soc: fsl: qe: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- software node: Fix node registration (git-fixes).\n- soundwire: bus: Fix device found flag correctly (git-fixes).\n- soundwire: stream: fix memory leak in stream config error path (git-fixes).\n- spi: Introduce dspi_slave_abort() function for NXP\u0027s dspi SPI driver (bsc#1167260).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: cadence: set cqspi to the driver_data field of struct device (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).\n- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).\n- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).\n- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).\n- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).\n- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).\n- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).\n- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).\n- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).\n- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).\n- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).\n- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1167260).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).\n- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).\n- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).\n- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).\n- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Fix typos (bsc#1167260).\n- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).\n- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).\n- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).\n- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).\n- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).\n- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).\n- spi: spi-fsl-dspi: Protect against races on dspi-\u003ewords_in_flight (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).\n- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).\n- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).\n- spi: spi-fsl-dspi: Remove pointless assignment of master-\u003etransfer to NULL (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused chip-\u003evoid_write_data (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).\n- spi: spi-fsl-dspi: Remove unused initialization of \u0027ret\u0027 in dspi_probe (bsc#1167260).\n- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).\n- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).\n- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).\n- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).\n- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).\n- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).\n- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).\n- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).\n- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).\n- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).\n- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).\n- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).\n- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).\n- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260\n- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).\n- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- spi: stm32: make spurious and overrun interrupts visible (git-fixes).\n- squashfs: fix inode lookup sanity checks (bsc#1183750).\n- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).\n- staging: bcm2835-audio: Replace unsafe strcpy() with strscpy() (git-fixes).\n- staging: comedi: addi_apci_1032: Fix endian problem for COS sample (git-fixes).\n- staging: comedi: addi_apci_1500: Fix endian problem for command sample (git-fixes).\n- staging: comedi: adv_pci1710: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: cb_pcidas64: fix request_irq() warn (git-fixes).\n- staging: comedi: cb_pcidas: fix request_irq() warn (git-fixes).\n- staging: comedi: das6402: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: das800: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: dmm32at: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: me4000: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl711: Fix endian problem for AI command data (git-fixes).\n- staging: comedi: pcl818: Fix endian problem for AI command data (git-fixes).\n- staging: fwserial: Fix error handling in fwserial_create (git-fixes).\n- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).\n- staging: ks7010: prevent buffer overflow in ks_wlan_set_scan() (git-fixes).\n- staging: most: sound: add sanity check for function argument (git-fixes).\n- staging: rtl8188eu: fix potential memory corruption in rtw_check_beacon_data() (git-fixes).\n- staging: rtl8188eu: prevent -\u003essid overflow in rtw_wx_set_scan() (git-fixes).\n- staging: rtl8192e: Change state information from u16 to u8 (git-fixes).\n- staging: rtl8192e: Fix incorrect source in memcpy() (git-fixes).\n- staging: rtl8192e: Fix possible buffer overflow in _rtl92e_wx_set_scan (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- staging: rtl8192u: fix -\u003essid overflow in r8192_wx_set_scan() (git-fixes).\n- staging: rtl8712: Fix possible buffer overflow in r8712_sitesurvey_cmd (git-fixes).\n- staging: rtl8712: unterminated string leads to read overflow (git-fixes).\n- stop_machine: mark helpers __always_inline (git-fixes).\n- supported.conf:\n- supported.conf: add bsc1185010 dependency\n- supported.conf: mark usb_otg_fsm as supported (bsc#1185010)\n- tcp: fix to update snd_wl1 in bulk receiver fast path (\u0026lt;cover.1620748346.git.mkubecek@suse.cz\u003e).\n- tee: optee: remove need_resched() before cond_resched() (git-fixes).\n- tee: optee: replace might_sleep with cond_resched (git-fixes).\n- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).\n- thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed (git-fixes).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thermal: thermal_of: Fix error return code of thermal_of_populate_bind_params() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix a leak in tb_retimer_add() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Fix off by one in tb_port_find_retimer() (git-fixes).\n- thunderbolt: Initialize HopID IDAs in tb_switch_alloc() (git-fixes).\n- tools/resolve_btfids: Fix build error with older host toolchains (bsc#1177028).\n- tpm: acpi: Check eventlog signature before using it (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- tty: serial: lpuart: fix lpuart32_write usage (git-fixes).\n- tty: serial: ucc_uart: replace qe_io{read,write}* wrappers by generic io{read,write}* (git-fixes).\n- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb-storage: Add quirk to defeat Kindle\u0027s automatic unload (git-fixes).\n- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc2: Fix hibernation between host and device modes (git-fixes).\n- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).\n- usb: dwc2: Fix session request interrupt handler (git-fixes).\n- usb: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).\n- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).\n- usb: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: Fix double free of device descriptor pointers (git-fixes).\n- usb: gadget: aspeed: fix dma map failure (git-fixes).\n- usb: gadget: configfs: Fix KASAN use-after-free (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: stop playback on function disable (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).\n- usb: gadget: pch_udc: Check if driver is present before calling -\u003esetup() (git-fixes).\n- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).\n- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).\n- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).\n- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).\n- usb: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: Fix suspend with devices connected for a64 (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: pci-quirks: disable D3cold on xhci suspend for s2idle on AMD Renoire (bsc#1185840).\n- usb: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: roles: Call try_module_get() from usb_role_switch_find_by_fwnode() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: Remove vdo[3] part of tps6598x_rx_identity_reg struct (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).\n- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: tps6598x: Fix return value check in tps6598x_probe() (git-fixes).\n- usb: typec: ucsi: Put fwnode in any case during -\u003eprobe() (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).\n- usb: xhci-mtk: improve bandwidth scheduling with TT (git-fixes).\n- usb: xhci-mtk: remove or operator for setting schedule parameters (git-fixes).\n- usb: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).\n- usbip: Fix incorrect double assignment to udc-\u003eud.tcp_rx (git-fixes).\n- usbip: fix stub_dev to check for stream socket (git-fixes).\n- usbip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).\n- usbip: fix vhci_hcd to check for stream socket (git-fixes).\n- usbip: fix vudc to check for stream socket (git-fixes).\n- usbip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).\n- usbip: tools: fix build error for multiple definition (git-fixes).\n- usbip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).\n- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).\n- veth: Store queue_mapping independently of XDP prog presence (git-fixes).\n- vfio-pci/zdev: fix possible segmentation fault issue (git-fixes).\n- vfio/iommu_type1: Populate full dirty when detach non-pinned group (bsc#1183326).\n- vfio/mdev: Do not allow a mdev_type to have a NULL parent pointer (git-fixes).\n- vfio/mdev: Make to_mdev_device() into a static inline (git-fixes).\n- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).\n- vfio/pci: Move VGA and VF initialization to functions (git-fixes).\n- vfio/pci: Re-order vfio_pci_probe() (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).\n- virt_wifi: Return micros for BSS TSF values (git-fixes).\n- virtiofs: fix memory leak in virtio_fs_probe() (bsc#1185558).\n- vrf: fix a comment about loopback device (git-fixes).\n- vt/consolemap: do font sum unsigned (git-fixes).\n- vxlan: do not modify the shared tunnel info when PMTU triggers an ICMP reply (bsc#1176447).\n- vxlan: move debug check after netdev unregister (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests (bsc#1186219).\n- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).\n- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).\n- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).\n- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).\n- x86/ioapic: Ignore IRQ2 again (bsc#1152489).\n- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).\n- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).\n- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).\n- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).\n- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).\n- x86/sev-es: Invalidate the GHCB after completing VMGEXIT (bsc#1178134).\n- x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch (bsc#1178134).\n- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).\n- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).\n- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).\n- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).\n- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).\n- xfrm: Provide private skb extensions for segmented and hw offloaded ESP packets (bsc#1176447).\n- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).\n- xhci: Improve detection of device initiated wake signal (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-1977",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1977-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1977-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1977-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1113295",
"url": "https://bugzilla.suse.com/1113295"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153274",
"url": "https://bugzilla.suse.com/1153274"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1160634",
"url": "https://bugzilla.suse.com/1160634"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1167260",
"url": "https://bugzilla.suse.com/1167260"
},
{
"category": "self",
"summary": "SUSE Bug 1167574",
"url": "https://bugzilla.suse.com/1167574"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1168777",
"url": "https://bugzilla.suse.com/1168777"
},
{
"category": "self",
"summary": "SUSE Bug 1168838",
"url": "https://bugzilla.suse.com/1168838"
},
{
"category": "self",
"summary": "SUSE Bug 1169709",
"url": "https://bugzilla.suse.com/1169709"
},
{
"category": "self",
"summary": "SUSE Bug 1171295",
"url": "https://bugzilla.suse.com/1171295"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1174416",
"url": "https://bugzilla.suse.com/1174416"
},
{
"category": "self",
"summary": "SUSE Bug 1174426",
"url": "https://bugzilla.suse.com/1174426"
},
{
"category": "self",
"summary": "SUSE Bug 1175995",
"url": "https://bugzilla.suse.com/1175995"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1177028",
"url": "https://bugzilla.suse.com/1177028"
},
{
"category": "self",
"summary": "SUSE Bug 1177326",
"url": "https://bugzilla.suse.com/1177326"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178089",
"url": "https://bugzilla.suse.com/1178089"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1178163",
"url": "https://bugzilla.suse.com/1178163"
},
{
"category": "self",
"summary": "SUSE Bug 1178330",
"url": "https://bugzilla.suse.com/1178330"
},
{
"category": "self",
"summary": "SUSE Bug 1178378",
"url": "https://bugzilla.suse.com/1178378"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1179243",
"url": "https://bugzilla.suse.com/1179243"
},
{
"category": "self",
"summary": "SUSE Bug 1179519",
"url": "https://bugzilla.suse.com/1179519"
},
{
"category": "self",
"summary": "SUSE Bug 1179825",
"url": "https://bugzilla.suse.com/1179825"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1180197",
"url": "https://bugzilla.suse.com/1180197"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1180846",
"url": "https://bugzilla.suse.com/1180846"
},
{
"category": "self",
"summary": "SUSE Bug 1181104",
"url": "https://bugzilla.suse.com/1181104"
},
{
"category": "self",
"summary": "SUSE Bug 1181383",
"url": "https://bugzilla.suse.com/1181383"
},
{
"category": "self",
"summary": "SUSE Bug 1181507",
"url": "https://bugzilla.suse.com/1181507"
},
{
"category": "self",
"summary": "SUSE Bug 1181674",
"url": "https://bugzilla.suse.com/1181674"
},
{
"category": "self",
"summary": "SUSE Bug 1181862",
"url": "https://bugzilla.suse.com/1181862"
},
{
"category": "self",
"summary": "SUSE Bug 1182077",
"url": "https://bugzilla.suse.com/1182077"
},
{
"category": "self",
"summary": "SUSE Bug 1182257",
"url": "https://bugzilla.suse.com/1182257"
},
{
"category": "self",
"summary": "SUSE Bug 1182377",
"url": "https://bugzilla.suse.com/1182377"
},
{
"category": "self",
"summary": "SUSE Bug 1182552",
"url": "https://bugzilla.suse.com/1182552"
},
{
"category": "self",
"summary": "SUSE Bug 1182574",
"url": "https://bugzilla.suse.com/1182574"
},
{
"category": "self",
"summary": "SUSE Bug 1182613",
"url": "https://bugzilla.suse.com/1182613"
},
{
"category": "self",
"summary": "SUSE Bug 1182712",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "self",
"summary": "SUSE Bug 1182715",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "self",
"summary": "SUSE Bug 1182717",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183022",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "self",
"summary": "SUSE Bug 1183069",
"url": "https://bugzilla.suse.com/1183069"
},
{
"category": "self",
"summary": "SUSE Bug 1183252",
"url": "https://bugzilla.suse.com/1183252"
},
{
"category": "self",
"summary": "SUSE Bug 1183277",
"url": "https://bugzilla.suse.com/1183277"
},
{
"category": "self",
"summary": "SUSE Bug 1183278",
"url": "https://bugzilla.suse.com/1183278"
},
{
"category": "self",
"summary": "SUSE Bug 1183279",
"url": "https://bugzilla.suse.com/1183279"
},
{
"category": "self",
"summary": "SUSE Bug 1183280",
"url": "https://bugzilla.suse.com/1183280"
},
{
"category": "self",
"summary": "SUSE Bug 1183281",
"url": "https://bugzilla.suse.com/1183281"
},
{
"category": "self",
"summary": "SUSE Bug 1183282",
"url": "https://bugzilla.suse.com/1183282"
},
{
"category": "self",
"summary": "SUSE Bug 1183283",
"url": "https://bugzilla.suse.com/1183283"
},
{
"category": "self",
"summary": "SUSE Bug 1183284",
"url": "https://bugzilla.suse.com/1183284"
},
{
"category": "self",
"summary": "SUSE Bug 1183285",
"url": "https://bugzilla.suse.com/1183285"
},
{
"category": "self",
"summary": "SUSE Bug 1183286",
"url": "https://bugzilla.suse.com/1183286"
},
{
"category": "self",
"summary": "SUSE Bug 1183287",
"url": "https://bugzilla.suse.com/1183287"
},
{
"category": "self",
"summary": "SUSE Bug 1183288",
"url": "https://bugzilla.suse.com/1183288"
},
{
"category": "self",
"summary": "SUSE Bug 1183289",
"url": "https://bugzilla.suse.com/1183289"
},
{
"category": "self",
"summary": "SUSE Bug 1183310",
"url": "https://bugzilla.suse.com/1183310"
},
{
"category": "self",
"summary": "SUSE Bug 1183311",
"url": "https://bugzilla.suse.com/1183311"
},
{
"category": "self",
"summary": "SUSE Bug 1183312",
"url": "https://bugzilla.suse.com/1183312"
},
{
"category": "self",
"summary": "SUSE Bug 1183313",
"url": "https://bugzilla.suse.com/1183313"
},
{
"category": "self",
"summary": "SUSE Bug 1183314",
"url": "https://bugzilla.suse.com/1183314"
},
{
"category": "self",
"summary": "SUSE Bug 1183315",
"url": "https://bugzilla.suse.com/1183315"
},
{
"category": "self",
"summary": "SUSE Bug 1183316",
"url": "https://bugzilla.suse.com/1183316"
},
{
"category": "self",
"summary": "SUSE Bug 1183317",
"url": "https://bugzilla.suse.com/1183317"
},
{
"category": "self",
"summary": "SUSE Bug 1183318",
"url": "https://bugzilla.suse.com/1183318"
},
{
"category": "self",
"summary": "SUSE Bug 1183319",
"url": "https://bugzilla.suse.com/1183319"
},
{
"category": "self",
"summary": "SUSE Bug 1183320",
"url": "https://bugzilla.suse.com/1183320"
},
{
"category": "self",
"summary": "SUSE Bug 1183321",
"url": "https://bugzilla.suse.com/1183321"
},
{
"category": "self",
"summary": "SUSE Bug 1183322",
"url": "https://bugzilla.suse.com/1183322"
},
{
"category": "self",
"summary": "SUSE Bug 1183323",
"url": "https://bugzilla.suse.com/1183323"
},
{
"category": "self",
"summary": "SUSE Bug 1183324",
"url": "https://bugzilla.suse.com/1183324"
},
{
"category": "self",
"summary": "SUSE Bug 1183326",
"url": "https://bugzilla.suse.com/1183326"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183366",
"url": "https://bugzilla.suse.com/1183366"
},
{
"category": "self",
"summary": "SUSE Bug 1183369",
"url": "https://bugzilla.suse.com/1183369"
},
{
"category": "self",
"summary": "SUSE Bug 1183386",
"url": "https://bugzilla.suse.com/1183386"
},
{
"category": "self",
"summary": "SUSE Bug 1183405",
"url": "https://bugzilla.suse.com/1183405"
},
{
"category": "self",
"summary": "SUSE Bug 1183412",
"url": "https://bugzilla.suse.com/1183412"
},
{
"category": "self",
"summary": "SUSE Bug 1183427",
"url": "https://bugzilla.suse.com/1183427"
},
{
"category": "self",
"summary": "SUSE Bug 1183428",
"url": "https://bugzilla.suse.com/1183428"
},
{
"category": "self",
"summary": "SUSE Bug 1183445",
"url": "https://bugzilla.suse.com/1183445"
},
{
"category": "self",
"summary": "SUSE Bug 1183447",
"url": "https://bugzilla.suse.com/1183447"
},
{
"category": "self",
"summary": "SUSE Bug 1183491",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "self",
"summary": "SUSE Bug 1183501",
"url": "https://bugzilla.suse.com/1183501"
},
{
"category": "self",
"summary": "SUSE Bug 1183509",
"url": "https://bugzilla.suse.com/1183509"
},
{
"category": "self",
"summary": "SUSE Bug 1183530",
"url": "https://bugzilla.suse.com/1183530"
},
{
"category": "self",
"summary": "SUSE Bug 1183534",
"url": "https://bugzilla.suse.com/1183534"
},
{
"category": "self",
"summary": "SUSE Bug 1183540",
"url": "https://bugzilla.suse.com/1183540"
},
{
"category": "self",
"summary": "SUSE Bug 1183593",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "self",
"summary": "SUSE Bug 1183596",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "self",
"summary": "SUSE Bug 1183598",
"url": "https://bugzilla.suse.com/1183598"
},
{
"category": "self",
"summary": "SUSE Bug 1183637",
"url": "https://bugzilla.suse.com/1183637"
},
{
"category": "self",
"summary": "SUSE Bug 1183646",
"url": "https://bugzilla.suse.com/1183646"
},
{
"category": "self",
"summary": "SUSE Bug 1183658",
"url": "https://bugzilla.suse.com/1183658"
},
{
"category": "self",
"summary": "SUSE Bug 1183662",
"url": "https://bugzilla.suse.com/1183662"
},
{
"category": "self",
"summary": "SUSE Bug 1183686",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "self",
"summary": "SUSE Bug 1183692",
"url": "https://bugzilla.suse.com/1183692"
},
{
"category": "self",
"summary": "SUSE Bug 1183750",
"url": "https://bugzilla.suse.com/1183750"
},
{
"category": "self",
"summary": "SUSE Bug 1183757",
"url": "https://bugzilla.suse.com/1183757"
},
{
"category": "self",
"summary": "SUSE Bug 1183775",
"url": "https://bugzilla.suse.com/1183775"
},
{
"category": "self",
"summary": "SUSE Bug 1183815",
"url": "https://bugzilla.suse.com/1183815"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183871",
"url": "https://bugzilla.suse.com/1183871"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1183976",
"url": "https://bugzilla.suse.com/1183976"
},
{
"category": "self",
"summary": "SUSE Bug 1184074",
"url": "https://bugzilla.suse.com/1184074"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184120",
"url": "https://bugzilla.suse.com/1184120"
},
{
"category": "self",
"summary": "SUSE Bug 1184167",
"url": "https://bugzilla.suse.com/1184167"
},
{
"category": "self",
"summary": "SUSE Bug 1184168",
"url": "https://bugzilla.suse.com/1184168"
},
{
"category": "self",
"summary": "SUSE Bug 1184170",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "self",
"summary": "SUSE Bug 1184171",
"url": "https://bugzilla.suse.com/1184171"
},
{
"category": "self",
"summary": "SUSE Bug 1184192",
"url": "https://bugzilla.suse.com/1184192"
},
{
"category": "self",
"summary": "SUSE Bug 1184193",
"url": "https://bugzilla.suse.com/1184193"
},
{
"category": "self",
"summary": "SUSE Bug 1184194",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "self",
"summary": "SUSE Bug 1184196",
"url": "https://bugzilla.suse.com/1184196"
},
{
"category": "self",
"summary": "SUSE Bug 1184197",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "self",
"summary": "SUSE Bug 1184198",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "self",
"summary": "SUSE Bug 1184199",
"url": "https://bugzilla.suse.com/1184199"
},
{
"category": "self",
"summary": "SUSE Bug 1184208",
"url": "https://bugzilla.suse.com/1184208"
},
{
"category": "self",
"summary": "SUSE Bug 1184209",
"url": "https://bugzilla.suse.com/1184209"
},
{
"category": "self",
"summary": "SUSE Bug 1184211",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "self",
"summary": "SUSE Bug 1184217",
"url": "https://bugzilla.suse.com/1184217"
},
{
"category": "self",
"summary": "SUSE Bug 1184218",
"url": "https://bugzilla.suse.com/1184218"
},
{
"category": "self",
"summary": "SUSE Bug 1184219",
"url": "https://bugzilla.suse.com/1184219"
},
{
"category": "self",
"summary": "SUSE Bug 1184220",
"url": "https://bugzilla.suse.com/1184220"
},
{
"category": "self",
"summary": "SUSE Bug 1184224",
"url": "https://bugzilla.suse.com/1184224"
},
{
"category": "self",
"summary": "SUSE Bug 1184264",
"url": "https://bugzilla.suse.com/1184264"
},
{
"category": "self",
"summary": "SUSE Bug 1184386",
"url": "https://bugzilla.suse.com/1184386"
},
{
"category": "self",
"summary": "SUSE Bug 1184388",
"url": "https://bugzilla.suse.com/1184388"
},
{
"category": "self",
"summary": "SUSE Bug 1184391",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "self",
"summary": "SUSE Bug 1184393",
"url": "https://bugzilla.suse.com/1184393"
},
{
"category": "self",
"summary": "SUSE Bug 1184436",
"url": "https://bugzilla.suse.com/1184436"
},
{
"category": "self",
"summary": "SUSE Bug 1184485",
"url": "https://bugzilla.suse.com/1184485"
},
{
"category": "self",
"summary": "SUSE Bug 1184514",
"url": "https://bugzilla.suse.com/1184514"
},
{
"category": "self",
"summary": "SUSE Bug 1184585",
"url": "https://bugzilla.suse.com/1184585"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184615",
"url": "https://bugzilla.suse.com/1184615"
},
{
"category": "self",
"summary": "SUSE Bug 1184650",
"url": "https://bugzilla.suse.com/1184650"
},
{
"category": "self",
"summary": "SUSE Bug 1184710",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "self",
"summary": "SUSE Bug 1184724",
"url": "https://bugzilla.suse.com/1184724"
},
{
"category": "self",
"summary": "SUSE Bug 1184728",
"url": "https://bugzilla.suse.com/1184728"
},
{
"category": "self",
"summary": "SUSE Bug 1184730",
"url": "https://bugzilla.suse.com/1184730"
},
{
"category": "self",
"summary": "SUSE Bug 1184731",
"url": "https://bugzilla.suse.com/1184731"
},
{
"category": "self",
"summary": "SUSE Bug 1184736",
"url": "https://bugzilla.suse.com/1184736"
},
{
"category": "self",
"summary": "SUSE Bug 1184737",
"url": "https://bugzilla.suse.com/1184737"
},
{
"category": "self",
"summary": "SUSE Bug 1184738",
"url": "https://bugzilla.suse.com/1184738"
},
{
"category": "self",
"summary": "SUSE Bug 1184740",
"url": "https://bugzilla.suse.com/1184740"
},
{
"category": "self",
"summary": "SUSE Bug 1184741",
"url": "https://bugzilla.suse.com/1184741"
},
{
"category": "self",
"summary": "SUSE Bug 1184742",
"url": "https://bugzilla.suse.com/1184742"
},
{
"category": "self",
"summary": "SUSE Bug 1184769",
"url": "https://bugzilla.suse.com/1184769"
},
{
"category": "self",
"summary": "SUSE Bug 1184811",
"url": "https://bugzilla.suse.com/1184811"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1184934",
"url": "https://bugzilla.suse.com/1184934"
},
{
"category": "self",
"summary": "SUSE Bug 1184942",
"url": "https://bugzilla.suse.com/1184942"
},
{
"category": "self",
"summary": "SUSE Bug 1184943",
"url": "https://bugzilla.suse.com/1184943"
},
{
"category": "self",
"summary": "SUSE Bug 1184955",
"url": "https://bugzilla.suse.com/1184955"
},
{
"category": "self",
"summary": "SUSE Bug 1184969",
"url": "https://bugzilla.suse.com/1184969"
},
{
"category": "self",
"summary": "SUSE Bug 1184984",
"url": "https://bugzilla.suse.com/1184984"
},
{
"category": "self",
"summary": "SUSE Bug 1185010",
"url": "https://bugzilla.suse.com/1185010"
},
{
"category": "self",
"summary": "SUSE Bug 1185113",
"url": "https://bugzilla.suse.com/1185113"
},
{
"category": "self",
"summary": "SUSE Bug 1185233",
"url": "https://bugzilla.suse.com/1185233"
},
{
"category": "self",
"summary": "SUSE Bug 1185269",
"url": "https://bugzilla.suse.com/1185269"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185491",
"url": "https://bugzilla.suse.com/1185491"
},
{
"category": "self",
"summary": "SUSE Bug 1185495",
"url": "https://bugzilla.suse.com/1185495"
},
{
"category": "self",
"summary": "SUSE Bug 1185549",
"url": "https://bugzilla.suse.com/1185549"
},
{
"category": "self",
"summary": "SUSE Bug 1185550",
"url": "https://bugzilla.suse.com/1185550"
},
{
"category": "self",
"summary": "SUSE Bug 1185558",
"url": "https://bugzilla.suse.com/1185558"
},
{
"category": "self",
"summary": "SUSE Bug 1185573",
"url": "https://bugzilla.suse.com/1185573"
},
{
"category": "self",
"summary": "SUSE Bug 1185581",
"url": "https://bugzilla.suse.com/1185581"
},
{
"category": "self",
"summary": "SUSE Bug 1185586",
"url": "https://bugzilla.suse.com/1185586"
},
{
"category": "self",
"summary": "SUSE Bug 1185587",
"url": "https://bugzilla.suse.com/1185587"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185640",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "self",
"summary": "SUSE Bug 1185641",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "self",
"summary": "SUSE Bug 1185642",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185670",
"url": "https://bugzilla.suse.com/1185670"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185736",
"url": "https://bugzilla.suse.com/1185736"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185796",
"url": "https://bugzilla.suse.com/1185796"
},
{
"category": "self",
"summary": "SUSE Bug 1185840",
"url": "https://bugzilla.suse.com/1185840"
},
{
"category": "self",
"summary": "SUSE Bug 1185857",
"url": "https://bugzilla.suse.com/1185857"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185950",
"url": "https://bugzilla.suse.com/1185950"
},
{
"category": "self",
"summary": "SUSE Bug 1185980",
"url": "https://bugzilla.suse.com/1185980"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186009",
"url": "https://bugzilla.suse.com/1186009"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186111",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "self",
"summary": "SUSE Bug 1186118",
"url": "https://bugzilla.suse.com/1186118"
},
{
"category": "self",
"summary": "SUSE Bug 1186219",
"url": "https://bugzilla.suse.com/1186219"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186349",
"url": "https://bugzilla.suse.com/1186349"
},
{
"category": "self",
"summary": "SUSE Bug 1186352",
"url": "https://bugzilla.suse.com/1186352"
},
{
"category": "self",
"summary": "SUSE Bug 1186353",
"url": "https://bugzilla.suse.com/1186353"
},
{
"category": "self",
"summary": "SUSE Bug 1186354",
"url": "https://bugzilla.suse.com/1186354"
},
{
"category": "self",
"summary": "SUSE Bug 1186355",
"url": "https://bugzilla.suse.com/1186355"
},
{
"category": "self",
"summary": "SUSE Bug 1186356",
"url": "https://bugzilla.suse.com/1186356"
},
{
"category": "self",
"summary": "SUSE Bug 1186357",
"url": "https://bugzilla.suse.com/1186357"
},
{
"category": "self",
"summary": "SUSE Bug 1186401",
"url": "https://bugzilla.suse.com/1186401"
},
{
"category": "self",
"summary": "SUSE Bug 1186408",
"url": "https://bugzilla.suse.com/1186408"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186479",
"url": "https://bugzilla.suse.com/1186479"
},
{
"category": "self",
"summary": "SUSE Bug 1186484",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186512",
"url": "https://bugzilla.suse.com/1186512"
},
{
"category": "self",
"summary": "SUSE Bug 1186681",
"url": "https://bugzilla.suse.com/1186681"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27170 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27171 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27673 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27815 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35519 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36310 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36311 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36312 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36322 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27363 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27364 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27365 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28038 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28375 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28660 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28688 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28950 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28964 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28972 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29154 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29264 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29647 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-29650 page",
"url": "https://www.suse.com/security/cve/CVE-2021-29650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3428 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3444 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3444/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-11T13:07:21Z",
"generator": {
"date": "2021-07-11T13:07:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1977-1",
"initial_release_date": "2021-07-11T13:07:21Z",
"revision_history": [
{
"date": "2021-07-11T13:07:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.5.2.noarch",
"product_id": "kernel-devel-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch",
"product_id": "kernel-docs-html-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.5.2.noarch",
"product_id": "kernel-macros-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-5.3.18-59.5.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.5.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-extra-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x",
"product_id": "kernel-default-optional-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.s390x",
"product_id": "kernel-syms-5.3.18-59.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.5.2.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.5.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18814"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18814",
"url": "https://www.suse.com/security/cve/CVE-2019-18814"
},
{
"category": "external",
"summary": "SUSE Bug 1156256 for CVE-2019-18814",
"url": "https://bugzilla.suse.com/1156256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2019-18814"
},
{
"cve": "CVE-2019-19769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19769"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19769",
"url": "https://www.suse.com/security/cve/CVE-2019-19769"
},
{
"category": "external",
"summary": "SUSE Bug 1159280 for CVE-2019-19769",
"url": "https://bugzilla.suse.com/1159280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2019-19769"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25670"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25670",
"url": "https://www.suse.com/security/cve/CVE-2020-25670"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1178181"
},
{
"category": "external",
"summary": "SUSE Bug 1194680 for CVE-2020-25670",
"url": "https://bugzilla.suse.com/1194680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25670"
},
{
"cve": "CVE-2020-25671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25671"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25671",
"url": "https://www.suse.com/security/cve/CVE-2020-25671"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25671",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25671"
},
{
"cve": "CVE-2020-25672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25672"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak vulnerability was found in Linux kernel in llcp_sock_connect",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25672",
"url": "https://www.suse.com/security/cve/CVE-2020-25672"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25672",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25672"
},
{
"cve": "CVE-2020-25673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25673"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25673",
"url": "https://www.suse.com/security/cve/CVE-2020-25673"
},
{
"category": "external",
"summary": "SUSE Bug 1178181 for CVE-2020-25673",
"url": "https://bugzilla.suse.com/1178181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-25673"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2020-27170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27170"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27170",
"url": "https://www.suse.com/security/cve/CVE-2020-27170"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27170",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27171"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27171",
"url": "https://www.suse.com/security/cve/CVE-2020-27171"
},
{
"category": "external",
"summary": "SUSE Bug 1183686 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183686"
},
{
"category": "external",
"summary": "SUSE Bug 1183775 for CVE-2020-27171",
"url": "https://bugzilla.suse.com/1183775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27171"
},
{
"cve": "CVE-2020-27673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27673"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27673",
"url": "https://www.suse.com/security/cve/CVE-2020-27673"
},
{
"category": "external",
"summary": "SUSE Bug 1177411 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1177411"
},
{
"category": "external",
"summary": "SUSE Bug 1184583 for CVE-2020-27673",
"url": "https://bugzilla.suse.com/1184583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-27673"
},
{
"cve": "CVE-2020-27815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27815"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27815",
"url": "https://www.suse.com/security/cve/CVE-2020-27815"
},
{
"category": "external",
"summary": "SUSE Bug 1179454 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179454"
},
{
"category": "external",
"summary": "SUSE Bug 1179458 for CVE-2020-27815",
"url": "https://bugzilla.suse.com/1179458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-27815"
},
{
"cve": "CVE-2020-35519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35519"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35519",
"url": "https://www.suse.com/security/cve/CVE-2020-35519"
},
{
"category": "external",
"summary": "SUSE Bug 1183696 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1183696"
},
{
"category": "external",
"summary": "SUSE Bug 1184953 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1184953"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2020-35519",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-35519"
},
{
"cve": "CVE-2020-36310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36310"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36310",
"url": "https://www.suse.com/security/cve/CVE-2020-36310"
},
{
"category": "external",
"summary": "SUSE Bug 1184512 for CVE-2020-36310",
"url": "https://bugzilla.suse.com/1184512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-36310"
},
{
"cve": "CVE-2020-36311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36311"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36311",
"url": "https://www.suse.com/security/cve/CVE-2020-36311"
},
{
"category": "external",
"summary": "SUSE Bug 1184511 for CVE-2020-36311",
"url": "https://bugzilla.suse.com/1184511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2020-36311"
},
{
"cve": "CVE-2020-36312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36312",
"url": "https://www.suse.com/security/cve/CVE-2020-36312"
},
{
"category": "external",
"summary": "SUSE Bug 1184509 for CVE-2020-36312",
"url": "https://bugzilla.suse.com/1184509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "low"
}
],
"title": "CVE-2020-36312"
},
{
"cve": "CVE-2020-36322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36322"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36322",
"url": "https://www.suse.com/security/cve/CVE-2020-36322"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184211"
},
{
"category": "external",
"summary": "SUSE Bug 1184952 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1184952"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36322",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2020-36322"
},
{
"cve": "CVE-2021-20268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20268"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20268",
"url": "https://www.suse.com/security/cve/CVE-2021-20268"
},
{
"category": "external",
"summary": "SUSE Bug 1183077 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183077"
},
{
"category": "external",
"summary": "SUSE Bug 1183095 for CVE-2021-20268",
"url": "https://bugzilla.suse.com/1183095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-20268"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-27363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27363",
"url": "https://www.suse.com/security/cve/CVE-2021-27363"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1183120 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1183120"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27363",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27363"
},
{
"cve": "CVE-2021-27364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27364"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27364",
"url": "https://www.suse.com/security/cve/CVE-2021-27364"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1182716 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182716"
},
{
"category": "external",
"summary": "SUSE Bug 1182717 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1182717"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27364",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27364"
},
{
"cve": "CVE-2021-27365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27365"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27365",
"url": "https://www.suse.com/security/cve/CVE-2021-27365"
},
{
"category": "external",
"summary": "SUSE Bug 1182712 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182712"
},
{
"category": "external",
"summary": "SUSE Bug 1182715 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1182715"
},
{
"category": "external",
"summary": "SUSE Bug 1183491 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1183491"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-27365",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-27365"
},
{
"cve": "CVE-2021-28038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28038"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28038",
"url": "https://www.suse.com/security/cve/CVE-2021-28038"
},
{
"category": "external",
"summary": "SUSE Bug 1183022 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183022"
},
{
"category": "external",
"summary": "SUSE Bug 1183069 for CVE-2021-28038",
"url": "https://bugzilla.suse.com/1183069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28038"
},
{
"cve": "CVE-2021-28375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28375"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28375",
"url": "https://www.suse.com/security/cve/CVE-2021-28375"
},
{
"category": "external",
"summary": "SUSE Bug 1183596 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1183596"
},
{
"category": "external",
"summary": "SUSE Bug 1184955 for CVE-2021-28375",
"url": "https://bugzilla.suse.com/1184955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28375"
},
{
"cve": "CVE-2021-28660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28660"
}
],
"notes": [
{
"category": "general",
"text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28660",
"url": "https://www.suse.com/security/cve/CVE-2021-28660"
},
{
"category": "external",
"summary": "SUSE Bug 1183593 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183593"
},
{
"category": "external",
"summary": "SUSE Bug 1183658 for CVE-2021-28660",
"url": "https://bugzilla.suse.com/1183658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28660"
},
{
"cve": "CVE-2021-28688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28688"
}
],
"notes": [
{
"category": "general",
"text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28688",
"url": "https://www.suse.com/security/cve/CVE-2021-28688"
},
{
"category": "external",
"summary": "SUSE Bug 1183646 for CVE-2021-28688",
"url": "https://bugzilla.suse.com/1183646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28688"
},
{
"cve": "CVE-2021-28950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28950"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A \"stall on CPU\" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28950",
"url": "https://www.suse.com/security/cve/CVE-2021-28950"
},
{
"category": "external",
"summary": "SUSE Bug 1184194 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184194"
},
{
"category": "external",
"summary": "SUSE Bug 1184211 for CVE-2021-28950",
"url": "https://bugzilla.suse.com/1184211"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28950"
},
{
"cve": "CVE-2021-28952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28952"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28952",
"url": "https://www.suse.com/security/cve/CVE-2021-28952"
},
{
"category": "external",
"summary": "SUSE Bug 1184197 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184197"
},
{
"category": "external",
"summary": "SUSE Bug 1184199 for CVE-2021-28952",
"url": "https://bugzilla.suse.com/1184199"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-28952"
},
{
"cve": "CVE-2021-28964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28964"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28964",
"url": "https://www.suse.com/security/cve/CVE-2021-28964"
},
{
"category": "external",
"summary": "SUSE Bug 1184193 for CVE-2021-28964",
"url": "https://bugzilla.suse.com/1184193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28964"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-28972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28972"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name \u0027\\0\u0027 termination, aka CID-cc7a0bb058b8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28972",
"url": "https://www.suse.com/security/cve/CVE-2021-28972"
},
{
"category": "external",
"summary": "SUSE Bug 1184198 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1184198"
},
{
"category": "external",
"summary": "SUSE Bug 1220060 for CVE-2021-28972",
"url": "https://bugzilla.suse.com/1220060"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-28972"
},
{
"cve": "CVE-2021-29154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29154"
}
],
"notes": [
{
"category": "general",
"text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29154",
"url": "https://www.suse.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "SUSE Bug 1184391 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184391"
},
{
"category": "external",
"summary": "SUSE Bug 1184710 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1184710"
},
{
"category": "external",
"summary": "SUSE Bug 1186408 for CVE-2021-29154",
"url": "https://bugzilla.suse.com/1186408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29155"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29155",
"url": "https://www.suse.com/security/cve/CVE-2021-29155"
},
{
"category": "external",
"summary": "SUSE Bug 1184942 for CVE-2021-29155",
"url": "https://bugzilla.suse.com/1184942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29155"
},
{
"cve": "CVE-2021-29264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29264"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29264",
"url": "https://www.suse.com/security/cve/CVE-2021-29264"
},
{
"category": "external",
"summary": "SUSE Bug 1184168 for CVE-2021-29264",
"url": "https://bugzilla.suse.com/1184168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29264"
},
{
"cve": "CVE-2021-29265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29265"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29265",
"url": "https://www.suse.com/security/cve/CVE-2021-29265"
},
{
"category": "external",
"summary": "SUSE Bug 1184167 for CVE-2021-29265",
"url": "https://bugzilla.suse.com/1184167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29265"
},
{
"cve": "CVE-2021-29647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29647"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29647",
"url": "https://www.suse.com/security/cve/CVE-2021-29647"
},
{
"category": "external",
"summary": "SUSE Bug 1184192 for CVE-2021-29647",
"url": "https://bugzilla.suse.com/1184192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29647"
},
{
"cve": "CVE-2021-29650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-29650"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-29650",
"url": "https://www.suse.com/security/cve/CVE-2021-29650"
},
{
"category": "external",
"summary": "SUSE Bug 1184208 for CVE-2021-29650",
"url": "https://bugzilla.suse.com/1184208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30002"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30002",
"url": "https://www.suse.com/security/cve/CVE-2021-30002"
},
{
"category": "external",
"summary": "SUSE Bug 1184120 for CVE-2021-30002",
"url": "https://bugzilla.suse.com/1184120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-30002"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3428"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3428",
"url": "https://www.suse.com/security/cve/CVE-2021-3428"
},
{
"category": "external",
"summary": "SUSE Bug 1173485 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "external",
"summary": "SUSE Bug 1183509 for CVE-2021-3428",
"url": "https://bugzilla.suse.com/1183509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3428"
},
{
"cve": "CVE-2021-3444",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3444"
}
],
"notes": [
{
"category": "general",
"text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3444",
"url": "https://www.suse.com/security/cve/CVE-2021-3444"
},
{
"category": "external",
"summary": "SUSE Bug 1184170 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184170"
},
{
"category": "external",
"summary": "SUSE Bug 1184171 for CVE-2021-3444",
"url": "https://bugzilla.suse.com/1184171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3444"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.5.2.18.2.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.5.2.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.5.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.5.2.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-11T13:07:21Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
opensuse-su-2021:0947-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).\n- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).\n- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).\n- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).\n- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).\n- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).\n- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: intel8x0: Do not update period unless prepared (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).\n- ALSA: usb-audio: fix control-request direction (git-fixes).\n- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).\n- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).\n- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).\n- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).\n- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: check for zapped sk before connecting (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- Move upstreamed media fixes into sorted section\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).\n- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).\n- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).\n- PCI: thunder: Fix compile testing (git-fixes).\n- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).\n- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).\n- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).\n- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).\n- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).\n- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- amdgpu: avoid incorrect %hu format string (git-fixes).\n- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).\n- arm64: avoid -Woverride-init warning (git-fixes).\n- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).\n- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).\n- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).\n- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).\n- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).\n- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).\n- arm64: vdso32: make vdso32 install conditional (git-fixes).\n- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).\n- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).\n- blk-iocost: ioc_pd_free() shouldn\u0027t assume irq disabled (git-fixes).\n- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).\n- block/genhd: use atomic_t for disk_event-\u003eblock (bsc#1185497).\n- block: Fix three kernel-doc warnings (git-fixes).\n- block: fix get_max_io_size() (git-fixes).\n- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).\n- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).\n- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).\n- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).\n- cdrom: gdrom: initialize global variable at init time (git-fixes).\n- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).\n- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).\n- ceph: fix up error handling with snapdirs (bsc#1186501).\n- ceph: only check pool permissions for regular files (bsc#1186501).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).\n- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- crypto: qat - fix unmap invalid dma address (git-fixes).\n- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).\n- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (git-fixes).\n- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).\n- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: hv: Fix whitespace errors (bsc#1185725).\n- drm/amd/display: Fix UBSAN warning for not a valid value for type \u0027_Bool\u0027 (git-fixes).\n- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).\n- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).\n- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).\n- drm/amd/display: fix dml prefetch validation (git-fixes).\n- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).\n- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).\n- drm/i915: Avoid div-by-zero on gen2 (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Avoid power table parsing memory leaks (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/vkms: fix misuse of WARN_ON (git-fixes).\n- drm: Added orientation quirk for OneGX1 Pro (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- extcon: arizona: Fix various races on driver unbind (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).\n- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- futex: Change utime parameter to be \u0027const ... *\u0027 (git-fixes).\n- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).\n- futex: Get rid of the val2 conditional dance (git-fixes).\n- futex: Make syscall entry points less convoluted (git-fixes).\n- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)\n- genirq: Disable interrupts for force threaded handlers (git-fixes)\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- hrtimer: Update softirq_expires_next correctly after (git-fixes)\n- hwmon: (occ) Fix poll rate limiting (git-fixes).\n- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).\n- i2c: bail out early when RDWR parameters are wrong (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- ics932s401: fix broken handling of errors when word reading fails (git-fixes).\n- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).\n- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).\n- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).\n- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).\n- lpfc: Decouple port_template and vport_template (bsc#185032).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).\n- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).\n- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).\n- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (git-fixes).\n- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).\n- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).\n- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).\n- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).\n- net: enetc: fix link error again (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (git-fixes).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).\n- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).\n- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).\n- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).\n- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).\n- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- nvme-core: add cancel tagset helpers (bsc#1183976).\n- nvme-fabrics: decode host pathing error for connect (bsc#1179827).\n- nvme-fc: check sgl supported by target (bsc#1179827).\n- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).\n- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).\n- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).\n- nvme-fc: short-circuit reconnect retries (bsc#1179827).\n- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).\n- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).\n- nvme-pci: Remove tag from process cq (git-fixes).\n- nvme-pci: Remove two-pass completions (git-fixes).\n- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).\n- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).\n- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).\n- nvme-pci: dma read memory barrier for completions (git-fixes).\n- nvme-pci: fix \u0027slimmer CQ head update\u0027 (git-fixes).\n- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).\n- nvme-pci: remove last_sq_tail (git-fixes).\n- nvme-pci: remove volatile cqes (git-fixes).\n- nvme-pci: slimmer CQ head update (git-fixes).\n- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).\n- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).\n- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).\n- nvme-tcp: add clean action for failed reconnection (bsc#1183976).\n- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).\n- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).\n- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).\n- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).\n- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).\n- nvme: add \u0027kato\u0027 sysfs attribute (bsc#1179825).\n- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).\n- nvme: define constants for identification values (git-fixes).\n- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).\n- nvme: do not intialize hwmon for discovery controllers (git-fixes).\n- nvme: document nvme controller states (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).\n- nvme: fix controller instance leak (git-fixes).\n- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).\n- nvme: retrigger ANA log update if group descriptor isn\u0027t found (git-fixes)\n- nvme: sanitize KATO setting (bsc#1179825).\n- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).\n- nvmet: fix a memory leak (git-fixes).\n- nvmet: seset ns-\u003efile when open fails (bsc#1183873).\n- nvmet: use new ana_log_size instead the old one (bsc#1184259).\n- nxp-i2c: restore includes for kABI (bsc#1185589).\n- nxp-nci: add NXP1002 id (bsc#1185589).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: ingenic: Improve unreachable code generation (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).\n- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).\n- sched/eas: Do not update misfit status if the task is pinned (git-fixes)\n- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)\n- sched/fair: Fix unfairness caused by missing load decay (git-fixes)\n- scripts/git_sort/git_sort.py: add bpf git repo\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: fnic: Kill \u0027exclude_id\u0027 argument to fnic_cleanup_io() (bsc#1179851).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186451).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).\n- sctp: delay auto_asconf init until binding the first addr\n- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).\n- serial: core: fix suspicious security_locked_down() call (git-fixes).\n- serial: core: return early on unsupported ioctls (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- serial: stm32: fix tx_empty condition (git-fixes).\n- serial: tegra: Fix a mask operation that is always true (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).\n- spi: ath79: always call chipselect function (git-fixes).\n- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).\n- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).\n- tty: fix memory leak in vc_deallocate (git-fixes).\n- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).\n- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).\n- usb: dwc3: gadget: Enable suspend events (git-fixes).\n- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).\n- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).\n- usb: gadget: f_uac1: validate input parameters (git-fixes).\n- usb: gadget: f_uac2: validate input parameters (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).\n- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).\n- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n- vrf: fix a comment about loopback device (git-fixes).\n- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).\n- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).\n- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).\n- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).\n- whitespace cleanup\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).\n- workqueue: more destroy_workqueue() fixes (bsc#1185911).\n- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xhci: check control context is valid before dereferencing it (git-fixes).\n- xhci: fix potential array out of bounds with several interrupters (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (git-fixes).\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-947",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0947-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:0947-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:0947-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1155518",
"url": "https://bugzilla.suse.com/1155518"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1162702",
"url": "https://bugzilla.suse.com/1162702"
},
{
"category": "self",
"summary": "SUSE Bug 1164648",
"url": "https://bugzilla.suse.com/1164648"
},
{
"category": "self",
"summary": "SUSE Bug 1176564",
"url": "https://bugzilla.suse.com/1176564"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1178418",
"url": "https://bugzilla.suse.com/1178418"
},
{
"category": "self",
"summary": "SUSE Bug 1178612",
"url": "https://bugzilla.suse.com/1178612"
},
{
"category": "self",
"summary": "SUSE Bug 1179827",
"url": "https://bugzilla.suse.com/1179827"
},
{
"category": "self",
"summary": "SUSE Bug 1179851",
"url": "https://bugzilla.suse.com/1179851"
},
{
"category": "self",
"summary": "SUSE Bug 1182378",
"url": "https://bugzilla.suse.com/1182378"
},
{
"category": "self",
"summary": "SUSE Bug 1182999",
"url": "https://bugzilla.suse.com/1182999"
},
{
"category": "self",
"summary": "SUSE Bug 1183346",
"url": "https://bugzilla.suse.com/1183346"
},
{
"category": "self",
"summary": "SUSE Bug 1183868",
"url": "https://bugzilla.suse.com/1183868"
},
{
"category": "self",
"summary": "SUSE Bug 1183873",
"url": "https://bugzilla.suse.com/1183873"
},
{
"category": "self",
"summary": "SUSE Bug 1183932",
"url": "https://bugzilla.suse.com/1183932"
},
{
"category": "self",
"summary": "SUSE Bug 1183947",
"url": "https://bugzilla.suse.com/1183947"
},
{
"category": "self",
"summary": "SUSE Bug 1184081",
"url": "https://bugzilla.suse.com/1184081"
},
{
"category": "self",
"summary": "SUSE Bug 1184082",
"url": "https://bugzilla.suse.com/1184082"
},
{
"category": "self",
"summary": "SUSE Bug 1184611",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "self",
"summary": "SUSE Bug 1184855",
"url": "https://bugzilla.suse.com/1184855"
},
{
"category": "self",
"summary": "SUSE Bug 1185428",
"url": "https://bugzilla.suse.com/1185428"
},
{
"category": "self",
"summary": "SUSE Bug 1185497",
"url": "https://bugzilla.suse.com/1185497"
},
{
"category": "self",
"summary": "SUSE Bug 1185589",
"url": "https://bugzilla.suse.com/1185589"
},
{
"category": "self",
"summary": "SUSE Bug 1185606",
"url": "https://bugzilla.suse.com/1185606"
},
{
"category": "self",
"summary": "SUSE Bug 1185645",
"url": "https://bugzilla.suse.com/1185645"
},
{
"category": "self",
"summary": "SUSE Bug 1185677",
"url": "https://bugzilla.suse.com/1185677"
},
{
"category": "self",
"summary": "SUSE Bug 1185680",
"url": "https://bugzilla.suse.com/1185680"
},
{
"category": "self",
"summary": "SUSE Bug 1185696",
"url": "https://bugzilla.suse.com/1185696"
},
{
"category": "self",
"summary": "SUSE Bug 1185703",
"url": "https://bugzilla.suse.com/1185703"
},
{
"category": "self",
"summary": "SUSE Bug 1185725",
"url": "https://bugzilla.suse.com/1185725"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185859",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "self",
"summary": "SUSE Bug 1185861",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "self",
"summary": "SUSE Bug 1185863",
"url": "https://bugzilla.suse.com/1185863"
},
{
"category": "self",
"summary": "SUSE Bug 1185898",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "self",
"summary": "SUSE Bug 1185899",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "self",
"summary": "SUSE Bug 1185911",
"url": "https://bugzilla.suse.com/1185911"
},
{
"category": "self",
"summary": "SUSE Bug 1185938",
"url": "https://bugzilla.suse.com/1185938"
},
{
"category": "self",
"summary": "SUSE Bug 1185987",
"url": "https://bugzilla.suse.com/1185987"
},
{
"category": "self",
"summary": "SUSE Bug 1185988",
"url": "https://bugzilla.suse.com/1185988"
},
{
"category": "self",
"summary": "SUSE Bug 1186061",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "self",
"summary": "SUSE Bug 1186285",
"url": "https://bugzilla.suse.com/1186285"
},
{
"category": "self",
"summary": "SUSE Bug 1186320",
"url": "https://bugzilla.suse.com/1186320"
},
{
"category": "self",
"summary": "SUSE Bug 1186439",
"url": "https://bugzilla.suse.com/1186439"
},
{
"category": "self",
"summary": "SUSE Bug 1186441",
"url": "https://bugzilla.suse.com/1186441"
},
{
"category": "self",
"summary": "SUSE Bug 1186460",
"url": "https://bugzilla.suse.com/1186460"
},
{
"category": "self",
"summary": "SUSE Bug 1186498",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "self",
"summary": "SUSE Bug 1186501",
"url": "https://bugzilla.suse.com/1186501"
},
{
"category": "self",
"summary": "SUSE Bug 1186573",
"url": "https://bugzilla.suse.com/1186573"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26139 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26145 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26147 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26147/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23134 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32399 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33034 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33200 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-07-01T04:53:53Z",
"generator": {
"date": "2021-07-01T04:53:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:0947-1",
"initial_release_date": "2021-07-01T04:53:53Z",
"revision_history": [
{
"date": "2021-07-01T04:53:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"product_id": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
},
"product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-26139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26139"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26139",
"url": "https://www.suse.com/security/cve/CVE-2020-26139"
},
{
"category": "external",
"summary": "SUSE Bug 1186062 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1186062"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-26139",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26139"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-26145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26145"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26145",
"url": "https://www.suse.com/security/cve/CVE-2020-26145"
},
{
"category": "external",
"summary": "SUSE Bug 1185860 for CVE-2020-26145",
"url": "https://bugzilla.suse.com/1185860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26145"
},
{
"cve": "CVE-2020-26147",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26147"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26147",
"url": "https://www.suse.com/security/cve/CVE-2020-26147"
},
{
"category": "external",
"summary": "SUSE Bug 1233723 for CVE-2020-26147",
"url": "https://bugzilla.suse.com/1233723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "moderate"
}
],
"title": "CVE-2020-26147"
},
{
"cve": "CVE-2021-23134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23134"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23134",
"url": "https://www.suse.com/security/cve/CVE-2021-23134"
},
{
"category": "external",
"summary": "SUSE Bug 1186060 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186060"
},
{
"category": "external",
"summary": "SUSE Bug 1186061 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1186061"
},
{
"category": "external",
"summary": "SUSE Bug 1220739 for CVE-2021-23134",
"url": "https://bugzilla.suse.com/1220739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-23134"
},
{
"cve": "CVE-2021-32399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32399"
}
],
"notes": [
{
"category": "general",
"text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32399",
"url": "https://www.suse.com/security/cve/CVE-2021-32399"
},
{
"category": "external",
"summary": "SUSE Bug 1184611 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1184611"
},
{
"category": "external",
"summary": "SUSE Bug 1185898 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185898"
},
{
"category": "external",
"summary": "SUSE Bug 1185899 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1185899"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2021-32399",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33034"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33034",
"url": "https://www.suse.com/security/cve/CVE-2021-33034"
},
{
"category": "external",
"summary": "SUSE Bug 1186111 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186111"
},
{
"category": "external",
"summary": "SUSE Bug 1186285 for CVE-2021-33034",
"url": "https://bugzilla.suse.com/1186285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33200"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33200",
"url": "https://www.suse.com/security/cve/CVE-2021-33200"
},
{
"category": "external",
"summary": "SUSE Bug 1186484 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186484"
},
{
"category": "external",
"summary": "SUSE Bug 1186498 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1186498"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2021-33200",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-33200"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.14.1.noarch",
"openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.14.1.x86_64",
"openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-07-01T04:53:53Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
}
]
}
gsd-2021-32399
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-32399",
"description": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"id": "GSD-2021-32399",
"references": [
"https://www.suse.com/security/cve/CVE-2021-32399.html",
"https://access.redhat.com/errata/RHSA-2022:0157",
"https://access.redhat.com/errata/RHSA-2021:3725",
"https://access.redhat.com/errata/RHSA-2021:3523",
"https://access.redhat.com/errata/RHSA-2021:3522",
"https://access.redhat.com/errata/RHSA-2021:3477",
"https://access.redhat.com/errata/RHSA-2021:3399",
"https://access.redhat.com/errata/RHSA-2021:3392",
"https://access.redhat.com/errata/RHSA-2021:3381",
"https://access.redhat.com/errata/RHSA-2021:3380",
"https://access.redhat.com/errata/RHSA-2021:3375",
"https://access.redhat.com/errata/RHSA-2021:3363",
"https://access.redhat.com/errata/RHSA-2021:3328",
"https://access.redhat.com/errata/RHSA-2021:3327",
"https://access.redhat.com/errata/RHSA-2021:3321",
"https://access.redhat.com/errata/RHSA-2021:3320",
"https://access.redhat.com/errata/RHSA-2021:3181",
"https://access.redhat.com/errata/RHSA-2021:3173",
"https://access.redhat.com/errata/RHSA-2021:2736",
"https://access.redhat.com/errata/RHSA-2021:2716",
"https://access.redhat.com/errata/RHSA-2021:2715",
"https://access.redhat.com/errata/RHSA-2021:2714",
"https://ubuntu.com/security/CVE-2021-32399",
"https://advisories.mageia.org/CVE-2021-32399.html",
"https://security.archlinux.org/CVE-2021-32399",
"https://linux.oracle.com/cve/CVE-2021-32399.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-32399"
],
"details": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"id": "GSD-2021-32399",
"modified": "2023-12-13T01:23:09.373768Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-32399",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210622-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.12.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-32399"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"name": "[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210622-0006/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-05-13T20:53Z",
"publishedDate": "2021-05-10T22:15Z"
}
}
}
wid-sec-w-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
WID-SEC-W-2023-0063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Junos Space ist eine Software-Plattform, die eine Reihe von Applikationen f\u00fcr das Netzwerkmanagement beinhaltet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Juniper Junos Space ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Juniper Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0063.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0063"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA70182 vom 2023-01-12",
"url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Contrail-Service-Orchestration-Multiple-vulnerabilities-resolved-in-CSO-6-3-0?language=en_US"
},
{
"category": "external",
"summary": "Juniper Security Advisory vom 2022-01-12",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11287\u0026cat=SIRT_1"
}
],
"source_lang": "en-US",
"title": "Juniper Junos Space: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-01-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:41:07.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0063",
"initial_release_date": "2022-01-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-01-11T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Juniper aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper Contrail Service Orchestration",
"product": {
"name": "Juniper Contrail Service Orchestration",
"product_id": "T025794",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:contrail_service_orchestration:-"
}
}
},
{
"category": "product_name",
"name": "Juniper Junos Space \u003c 21.3R1",
"product": {
"name": "Juniper Junos Space \u003c 21.3R1",
"product_id": "T021576",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:21.3r1"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-20934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2019-20934"
},
{
"cve": "CVE-2020-0543",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-0548",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0548"
},
{
"cve": "CVE-2020-0549",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-0549"
},
{
"cve": "CVE-2020-11022",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11023"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-29443",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-29443"
},
{
"cve": "CVE-2020-8625",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8625"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8695",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8695"
},
{
"cve": "CVE-2020-8696",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8696"
},
{
"cve": "CVE-2020-8698",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-20254",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-20254"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22901",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-22901"
},
{
"cve": "CVE-2021-2341",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2369",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2388",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2388"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25214",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25214"
},
{
"cve": "CVE-2021-25217",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-25217"
},
{
"cve": "CVE-2021-27219",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-27219"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3653",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37576",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-42550",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-42550"
},
{
"cve": "CVE-2021-44228",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-44228"
},
{
"cve": "CVE-2021-45046",
"notes": [
{
"category": "description",
"text": "In Juniper Junos Space existieren mehrere Schwachstellen. Die Fehler existieren in verschiedenen Komponenten und Bibliotheken, darunter LZ4, Linux Kernel, Intel Prozessoren, Apache HTTP Server, BIND, Intel VT-d, Intel Grafiktreiber, KVM Hypervisor, QEMU, Java SE, MySQL Server, samba, curl, GNOME, jQuery, Apache Log4j und logback. Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, beliebigen Code auszuf\u00fchren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte."
}
],
"product_status": {
"known_affected": [
"T025794"
]
},
"release_date": "2022-01-12T23:00:00.000+00:00",
"title": "CVE-2021-45046"
}
]
}
fkie_cve-2021-32399
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/05/11/2 | Exploit, Mailing List, Patch, Third Party Advisory | |
| cve@mitre.org | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80 | Mailing List, Patch, Vendor Advisory | |
| cve@mitre.org | https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80 | Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20210622-0006/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/05/11/2 | Exploit, Mailing List, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80 | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210622-0006/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| debian | debian_linux | 9.0 | |
| netapp | cloud_backup | - | |
| netapp | solidfire_baseboard_management_controller_firmware | - | |
| netapp | solidfire_baseboard_management_controller | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | h300e_firmware | - | |
| netapp | h300e | - | |
| netapp | h500e_firmware | - | |
| netapp | h500e | - | |
| netapp | h700e_firmware | - | |
| netapp | h700e | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E122193F-2C56-4FF3-BD30-DA6BC408C64B",
"versionEndIncluding": "5.12.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
},
{
"lang": "es",
"value": "El archivo net/bluetooth/hci_request.c en el kernel de Linux versiones hasta 5.12.2, presenta una condici\u00f3n de carrera para la eliminaci\u00f3n del controlador HCI"
}
],
"id": "CVE-2021-32399",
"lastModified": "2024-11-21T06:06:59.640",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-05-10T22:15:06.053",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/05/11/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/torvalds/linux/commit/e2cb6b891ad2b8caa9131e3be70f45243df82a80"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20210622-0006/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
msrc_cve-2021-32399
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-32399 net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-32399.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T21:59:28.359Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-32399",
"initial_release_date": "2021-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-05-15T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added kernel to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.60.1-1",
"product": {
"name": "\u003ccm1 kernel 5.10.60.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.60.1-1",
"product": {
"name": "cm1 kernel 5.10.60.1-1",
"product_id": "16919"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.10.78.1-1",
"product": {
"name": "cbl2 kernel 5.10.78.1-1",
"product_id": "16920"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.60.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.60.1-1 as a component of CBL Mariner 1.0",
"product_id": "16919-16820"
},
"product_reference": "16919",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "16920-17086"
},
"product_reference": "16920",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-32399",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"16919-16820",
"16920-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-32399 net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-32399.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-15T00:00:00.000Z",
"details": "-:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2021-05-15T00:00:00.000Z",
"details": "5.10.78.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller."
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.